053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(0x0, 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:05 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4}, 0x4) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:05 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391", 0x32}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:05 executing program 2: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:05 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4}, 0x4) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:05 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:05 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:05 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4}, 0x4) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:05 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391", 0x32}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:05 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:05 executing program 2: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:06 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391", 0x32}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:06 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:06 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) 17:15:06 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:06 executing program 2: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:06 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:06 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:06 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) 17:15:06 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f0", 0x36}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:07 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:07 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) 17:15:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) [ 2045.946484][ T27] kauditd_printk_skb: 212 callbacks suppressed 17:15:07 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2045.946491][ T27] audit: type=1325 audit(1582391707.141:43946): table=raw family=2 entries=3 [ 2045.949337][ T27] audit: type=1325 audit(1582391707.141:43947): table=security family=2 entries=4 17:15:07 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) [ 2045.956278][ T27] audit: type=1325 audit(1582391707.151:43948): table=filter family=10 entries=4 [ 2045.956904][ T27] audit: type=1325 audit(1582391707.151:43949): table=mangle family=10 entries=6 17:15:07 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, 0x0, 0x0) [ 2045.958903][ T27] audit: type=1325 audit(1582391707.151:43950): table=raw family=10 entries=3 [ 2045.959333][ T27] audit: type=1325 audit(1582391707.151:43951): table=security family=10 entries=4 17:15:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:07 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:07 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:07 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, 0x0, 0x0) [ 2046.229092][ T27] audit: type=1325 audit(1582391707.421:43952): table=filter family=2 entries=4 [ 2046.229438][ T27] audit: type=1325 audit(1582391707.421:43953): table=nat family=2 entries=5 [ 2046.229844][ T27] audit: type=1325 audit(1582391707.421:43954): table=mangle family=2 entries=6 [ 2046.239103][ T27] audit: type=1800 audit(1582391707.391:43955): pid=21502 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="loop5" ino=96 res=0 17:15:08 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f0", 0x36}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:08 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, 0x0, 0x0) 17:15:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:08 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:08 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 17:15:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:08 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:08 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:08 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:09 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f0", 0x36}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:09 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:09 executing program 1: ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r0, 0x0, 0x280900) 17:15:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:09 executing program 1: ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r0, 0x0, 0x280900) 17:15:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:10 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:10 executing program 1: ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r0, 0x0, 0x280900) 17:15:10 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:10 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:10 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f0093a", 0x38}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:10 executing program 1: r0 = creat(0x0, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:10 executing program 1: r0 = creat(0x0, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:10 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:11 executing program 1: r0 = creat(0x0, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:11 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:11 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f0", 0x36}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:11 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:11 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:11 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f0", 0x36}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:11 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:12 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:12 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:12 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:12 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) [ 2051.130930][ T27] kauditd_printk_skb: 189 callbacks suppressed [ 2051.130938][ T27] audit: type=1800 audit(1582391712.321:44145): pid=22916 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16570 res=0 17:15:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:12 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) [ 2051.133402][ T27] audit: type=1800 audit(1582391712.331:44146): pid=22914 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16569 res=0 [ 2051.400186][ T27] audit: type=1325 audit(1582391712.591:44147): table=filter family=3 entries=4 [ 2051.400206][ T27] audit: type=1325 audit(1582391712.591:44148): table=filter family=2 entries=4 [ 2051.400227][ T27] audit: type=1325 audit(1582391712.591:44149): table=nat family=2 entries=5 [ 2051.400253][ T27] audit: type=1325 audit(1582391712.591:44150): table=mangle family=2 entries=6 [ 2051.400275][ T27] audit: type=1325 audit(1582391712.591:44151): table=raw family=2 entries=3 [ 2051.400291][ T27] audit: type=1325 audit(1582391712.591:44152): table=security family=2 entries=4 17:15:12 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f0", 0x36}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) [ 2051.400308][ T27] audit: type=1325 audit(1582391712.591:44153): table=filter family=10 entries=4 [ 2051.400324][ T27] audit: type=1325 audit(1582391712.591:44154): table=mangle family=10 entries=6 17:15:13 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:13 executing program 2: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:13 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:13 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:13 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:13 executing program 2: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:13 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:13 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:14 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x0) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:14 executing program 2: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:14 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x0) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:14 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x0) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:14 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:14 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:14 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(0x0, 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:14 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:14 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:14 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(0x0, 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:15 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:15 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(0x0, 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:15 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, 0x0, 0x0) 17:15:15 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, 0x0, 0x0) 17:15:15 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:15 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) 17:15:15 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:15 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:15 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, 0x0, 0x0) 17:15:16 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:16 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0), 0x0) 17:15:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:16 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0), 0x0) 17:15:16 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) 17:15:16 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:16 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:16 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0), 0x0) [ 2055.821813][T24278] validate_nla: 5 callbacks suppressed [ 2055.821821][T24278] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 17:15:17 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{0x0}], 0x1) [ 2055.926216][T24278] __nla_validate_parse: 5 callbacks suppressed 17:15:17 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:17 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) [ 2055.926224][T24278] netlink: 18433 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2056.205393][ T27] kauditd_printk_skb: 172 callbacks suppressed 17:15:17 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{0x0}], 0x1) [ 2056.205401][ T27] audit: type=1325 audit(1582391717.401:44327): table=filter family=2 entries=4 17:15:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) [ 2056.205933][ T27] audit: type=1325 audit(1582391717.401:44328): table=nat family=2 entries=5 17:15:17 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) 17:15:17 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{0x0}], 0x1) [ 2056.206388][ T27] audit: type=1325 audit(1582391717.401:44329): table=mangle family=2 entries=6 [ 2056.206874][ T27] audit: type=1325 audit(1582391717.401:44330): table=raw family=2 entries=3 17:15:17 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) [ 2056.207366][ T27] audit: type=1325 audit(1582391717.401:44331): table=security family=2 entries=4 [ 2056.294368][T24292] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 2056.294382][T24292] netlink: 18433 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2056.311037][ T27] audit: type=1800 audit(1582391717.501:44332): pid=24293 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16576 res=0 17:15:17 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)}], 0x1) [ 2056.502182][ T27] audit: type=1325 audit(1582391717.701:44333): table=filter family=2 entries=4 [ 2056.505566][ T27] audit: type=1325 audit(1582391717.701:44334): table=nat family=2 entries=5 [ 2056.507916][ T27] audit: type=1325 audit(1582391717.701:44335): table=mangle family=2 entries=6 [ 2056.508369][ T27] audit: type=1325 audit(1582391717.701:44336): table=raw family=2 entries=3 [ 2056.618019][T24304] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 17:15:18 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) socket$kcm(0x10, 0x2, 0x10) 17:15:18 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) [ 2056.618032][T24304] netlink: 18433 bytes leftover after parsing attributes in process `syz-executor.3'. 17:15:18 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)}], 0x1) 17:15:18 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:18 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)}], 0x1) 17:15:18 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:18 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) 17:15:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:18 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4", 0x29}], 0x1) 17:15:18 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:18 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) socket$packet(0x11, 0x8000000003, 0x300) 17:15:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:18 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4", 0x29}], 0x1) 17:15:18 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r1, 0x0, 0x280900) 17:15:19 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) 17:15:19 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) 17:15:19 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:19 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) 17:15:19 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4", 0x29}], 0x1) 17:15:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:19 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) 17:15:20 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) 17:15:20 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6a", 0x3e}], 0x1) 17:15:20 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r1, 0x0, 0x280900) 17:15:20 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) 17:15:20 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:20 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) 17:15:20 executing program 3: socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) 17:15:20 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6a", 0x3e}], 0x1) 17:15:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:20 executing program 3: socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) 17:15:21 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6a", 0x3e}], 0x1) 17:15:21 executing program 3: socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x8de7d8f023d06bd7}, 0x4) 17:15:21 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r1, 0x0, 0x280900) 17:15:21 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 17:15:21 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:21 executing program 2: sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:21 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a26", 0x48}], 0x1) 17:15:21 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 17:15:21 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 17:15:22 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) 17:15:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:22 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) 17:15:22 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) 17:15:22 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a26", 0x48}], 0x1) 17:15:22 executing program 2: sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) [ 2061.247547][ T27] kauditd_printk_skb: 220 callbacks suppressed [ 2061.247555][ T27] audit: type=1325 audit(1582391722.441:44557): table=filter family=10 entries=4 17:15:22 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:22 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) [ 2061.350729][ T27] audit: type=1325 audit(1582391722.501:44558): table=mangle family=10 entries=6 [ 2061.397174][ T27] audit: type=1325 audit(1582391722.501:44559): table=raw family=10 entries=3 17:15:22 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4}, 0x4) [ 2061.397271][ T27] audit: type=1325 audit(1582391722.501:44560): table=security family=10 entries=4 [ 2061.397293][ T27] audit: type=1800 audit(1582391722.531:44561): pid=24462 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16540 res=0 [ 2061.397310][ T27] audit: type=1325 audit(1582391722.541:44562): table=filter family=10 entries=4 [ 2061.397327][ T27] audit: type=1325 audit(1582391722.541:44563): table=mangle family=10 entries=6 17:15:22 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4}, 0x4) [ 2061.397368][ T27] audit: type=1325 audit(1582391722.541:44564): table=raw family=10 entries=3 [ 2061.397386][ T27] audit: type=1325 audit(1582391722.541:44565): table=security family=10 entries=4 [ 2061.427699][ T27] audit: type=1325 audit(1582391722.621:44566): table=filter family=3 entries=4 17:15:23 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4}, 0x4) 17:15:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:23 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a26", 0x48}], 0x1) 17:15:23 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) 17:15:23 executing program 2: sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:23 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0", 0x4d}], 0x1) 17:15:23 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x280900) 17:15:23 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) 17:15:24 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:24 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0", 0x4d}], 0x1) 17:15:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:24 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) 17:15:24 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) 17:15:24 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:24 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) 17:15:24 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0", 0x4d}], 0x1) 17:15:25 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b", 0x50}], 0x1) 17:15:25 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:25 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x0) 17:15:25 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) 17:15:25 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b", 0x50}], 0x1) 17:15:25 executing program 3: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pivot_root(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$packet(r7, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14, 0x180000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockname$packet(r11, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000009c0)=0x14) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r17, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r17}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r22, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(r19, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r22}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(r18, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x2, r22}, [@IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000002}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x2, r22}, [@IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000002}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000cc0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000c80)={&(0x7f0000000a00)={0x280, r5, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x24, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0xa1, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x130, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xa}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xd}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r17}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x20, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x38, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}]}]}, 0x280}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000800) [ 2065.004718][T24558] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 2065.004732][T24558] netlink: 18433 bytes leftover after parsing attributes in process `syz-executor.3'. 17:15:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 17:15:26 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:26 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b", 0x50}], 0x1) 17:15:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 17:15:26 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r1, 0x0, 0x280900) 17:15:26 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x0) 17:15:26 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:27 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b31", 0x51}], 0x1) 17:15:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 17:15:27 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 17:15:27 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) [ 2066.395134][ T27] kauditd_printk_skb: 187 callbacks suppressed [ 2066.395141][ T27] audit: type=1325 audit(1582391727.591:44754): table=filter family=2 entries=4 [ 2066.398985][ T27] audit: type=1325 audit(1582391727.591:44755): table=nat family=2 entries=5 17:15:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:27 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 17:15:27 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r1, 0x0, 0x280900) [ 2066.410212][ T27] audit: type=1325 audit(1582391727.601:44756): table=mangle family=2 entries=6 [ 2066.410233][ T27] audit: type=1325 audit(1582391727.601:44757): table=raw family=2 entries=3 [ 2066.410249][ T27] audit: type=1325 audit(1582391727.601:44758): table=security family=2 entries=4 [ 2066.615326][ T27] audit: type=1325 audit(1582391727.811:44759): table=filter family=2 entries=4 17:15:27 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x0) [ 2066.616504][ T27] audit: type=1325 audit(1582391727.811:44760): table=nat family=2 entries=5 [ 2066.617437][ T27] audit: type=1325 audit(1582391727.811:44761): table=mangle family=2 entries=6 17:15:28 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b31", 0x51}], 0x1) 17:15:28 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) [ 2066.618149][ T27] audit: type=1325 audit(1582391727.811:44762): table=raw family=2 entries=3 [ 2066.620500][ T27] audit: type=1325 audit(1582391727.821:44763): table=security family=2 entries=4 17:15:28 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r1, 0x0, 0x280900) 17:15:28 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:28 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b31", 0x51}], 0x1) 17:15:28 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 17:15:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:29 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 17:15:29 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000000008001832f") r1 = syz_open_pts(r0, 0xef52100948ba0b62) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x4c110000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000140), {}, &(0x7f0000000200)=""/8, 0x8, 0x0, 0x0}, 0x50) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000c40)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) mount$overlay(0x40000a, &(0x7f0000000740)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0xc, 0x0, 0xffffffffffffffff, r7) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r12, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ipv4_newaddr={0x18, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r12}}, 0x18}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x2, r12}, [@IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000002}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000c80)="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", 0x1000, 0x4000, &(0x7f00000002c0)={0x11, 0x8, r12, 0x1, 0x1, 0x6, @random="f7c61088e28a"}, 0x14) request_key(&(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)={'syz', 0x2}, &(0x7f0000000880)='\x00', 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f00000005c0)) fstat(0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file1\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {0x1, 0x2}, [], {}, [{0x8, 0x1, r3}, {0x8, 0x0, r5}, {0x8, 0x3, r7}, {}], {0x10, 0x1}}, 0x44, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) ioctl$VT_DISALLOCATE(r1, 0x5608) 17:15:29 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) 17:15:29 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:29 executing program 3: socket$inet6(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 17:15:29 executing program 4: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x404400, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000580)={0x6, "999ecd"}, 0x6) lgetxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@known='trusted.overlay.origin\x00', &(0x7f0000000480)=""/171, 0xab) r2 = socket$packet(0x11, 0x8000000003, 0x300) timer_create(0x5, &(0x7f0000000080)={0x0, 0x20, 0x1, @thr={&(0x7f00000001c0)="9a1de66c0e0fdca285bb28abcfee8f3451ed689e6276d471876ea6cc496f0e45d1bb4944d727a71b5f88c62024fbdaa9bf19046e63a1b999af6dccb527b5a4cf29e220c6d334e7633ec3d1253a7e2ff3d998376c99fbe0b95a8bc023baa51cf110219de3d5cd3b46ea2cd1356dfc3b4171180f58caa54a6c7c09df30cff8b147c48365783eb19cf6756fe0fc5c508e8378e4c481ba8e001f9f6f9a3d24d51113a8fed43c56c3f73365a04cd2b84d4893", &(0x7f0000000280)="f0ece5c76fa3236a38a73d75e6f2788726d9d47e8593ba0fdd684be939bb7ef39b26dbcaa2ab856bd48d9de13f824c0f6efbd02abe9421bb3dfac3ae8a78c334ec1cd3a3053adc79132d900d59cd4e9492640e20c416287a8a071f6ebae4356ab79c0be37f079516842614c9093b0f2d610430cabcd0caf7a3f3ecfe0d0d08c97e6331812450d22f857f117aa3802082500e80265102fc308c2226a805235b2bb57ad4f838e306b6c827d0"}}, &(0x7f0000000100)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) write$P9_RAUTH(r0, &(0x7f00000000c0)={0x14, 0x67, 0x2, {0x20, 0x1, 0x7}}, 0x14) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$TIOCGICOUNT(r4, 0x545d, 0x0) r5 = getpgrp(0x0) r6 = syz_open_pts(0xffffffffffffffff, 0xef52100948ba0b62) ioctl$FIONREAD(r6, 0x541b, &(0x7f0000000080)) fremovexattr(r6, &(0x7f0000000380)=@known='system.sockprotoname\x00') r7 = syz_open_pts(0xffffffffffffffff, 0xef52100948ba0b62) ioctl$FIONREAD(r7, 0x541b, &(0x7f0000000080)) ioctl$TCGETS(r7, 0x5401, &(0x7f00000003c0)) capget(&(0x7f0000000000)={0x20071026, r5}, &(0x7f0000000040)={0x3, 0x9, 0x4, 0x10000, 0x401, 0x1000}) ptrace$peek(0x1, r5, &(0x7f0000000340)) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="0324fc60100000000a000a00053582c137153e37094801800600bd03f4469adfd4b9298d1700d1bd", 0x28}], 0x1}, 0x0) 17:15:29 executing program 3: socket$inet6(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 17:15:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, r1, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:29 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000000008001832f") r1 = syz_open_pts(r0, 0xef52100948ba0b62) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x4c110000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000140), {}, &(0x7f0000000200)=""/8, 0x8, 0x0, 0x0}, 0x50) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000c40)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) mount$overlay(0x40000a, &(0x7f0000000740)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0xc, 0x0, 0xffffffffffffffff, r7) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r12, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ipv4_newaddr={0x18, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r12}}, 0x18}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x2, r12}, [@IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000002}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000c80)="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", 0x1000, 0x4000, &(0x7f00000002c0)={0x11, 0x8, r12, 0x1, 0x1, 0x6, @random="f7c61088e28a"}, 0x14) request_key(&(0x7f0000000800)='asymmetric\x00', &(0x7f0000000840)={'syz', 0x2}, &(0x7f0000000880)='\x00', 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f00000005c0)) fstat(0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file1\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {0x1, 0x2}, [], {}, [{0x8, 0x1, r3}, {0x8, 0x0, r5}, {0x8, 0x3, r7}, {}], {0x10, 0x1}}, 0x44, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) ioctl$VT_DISALLOCATE(r1, 0x5608) 17:15:30 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:30 executing program 3: socket$inet6(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 17:15:30 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) 17:15:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 17:15:30 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 17:15:30 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="080db5055e0bcfe8698071") r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='illinois\x00', 0x9) sendmmsg(r1, &(0x7f0000000380), 0x0, 0x0) 17:15:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 17:15:31 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) 17:15:31 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="080db5055e0bcfe8698071") r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000500)='illinois\x00', 0x9) sendmmsg(r1, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001340)="682faedcb50b697c164d38e215fbe4aeeaa9f9924ab7aec50856912de401faf856086bbf9fab2132331748bf17c030c16128303ad964542e2d3b2a30fba6db55bdb66f9abf58b85cbcc671729959d81d26322432e66cd7344c9288b24b14973270ef6d9829bc1f1689155cda9dbff68b61cedebbfcfcaf6ee4f695f797d43fb9ca0e97742197c85f8a9e3febe62875e63dc3586fea82555eaf66e87c85c869c3920fb3e6375f36ffba68c0bb83186316414f90408e62786ebed94c66fa795c57511036a9775665573c1ee1f54fa55fbcf475315b3b7d5c88e2a98e1532238b67bf2719da066377e9e322271e038ea0450c6134840900f2c1bad53b4cfdc0b22fc3892e4ed50ee07efb608cab8458fb06d46e553590ca7fdcb2dda69d296b1c48e896526c8597c227fd1b945a98e604d80cb11ffcbb5a23fd1fa2bb109f4feab70d710f79974095ee2127a56361703a6c9c4b2d6089e54d27accbc70d38d6baca0080f3d08c8217f3046cda4a111ffdfe1c7a39c41f731a83650b15cd8b94edb65d4fbe86f413d19f8325631985e9a991fbb27bb46b8846b99eff4ac2189050c8708c136f1e44927ca4535eeebab494cfd1685bfd4cd7ce9bf93b8bf93f1bf9e92c675660e6b50f204e7e541cc99a26d346befb41617f274aeee2455ac0c69aaf78096646d1743ac84b003414213f81eeba793ae39562de130abf52893fd9195570d861e63621711d36d51ae13618e4b4133fe16b84e0e0acda5668349c6f9ec47e07e4fd42055c3ece417f4be62ec96a7132ccfaf045caccb78211139a317f27b10cb7df7333298eaba6487da636ad23e82c40557f1206159f5d8c7d3e0694a29c4b27e26bf2616475e5addc081c84a474fa133e883a471f4a9699be4b0c1853068739d86f40a64e9badca2d8dbc554edf8e8a97eb4841ffdaad555fbf603f67476b4d3a0c24e402801071e41cf0ad76fa94bff9dbf578df0e2d06a90251e604bf3e0184b96ced57b1561628b835a65bb70a22535d9623f317e376ecf10953f1e1de331cd829deb1e82dcd2c8235acd773d07851c927d3e92f337cb9dc8b0313fe6e607142cc62987ccb7bd5a1a2f05ba50119f048ae8f30f6823b145b937035c44ae859c2ea371ccabb4bb7dafb2c9239af621f7b9e8e3fe85d56b16f729688918a0dd25e682fadeedea015a23b778c89e590c0e066f5e464e6f2453d586570ad167a16645f9001752c0811d53a0c6811f180b8adebce14421b82d74725656d3bc76698d54a62453bdff031a450e424052684f533933dc5f157bd6a7d777363c0ef0721d8803662267f11b7cffacddbb274cbd6205a4c91ce471daabbd6bbaef7ee654b7cf2e87c4be87817c8ff50027ef80220f8d4f05362c723a1bca6ec04aa769016662f36a7197bfcfbd59b9a4fa45c929fa41ee37cb132f0e5bcd3fe1d64863f97955ba4783d8d21366d705ad47c596cad4910685bd407c4baf09b8b1cc2fc6200a558cfddaf4b9f05ae8166b6f4bf8b4ad8e93426fe0f150b7e74aba49ba0f53494b567d93f1c7177f1f0615002cc6ea3353d7b396c4068e0efbc91e865ebcbc7e151842bb97ec8295d210d79b08e82fff6440b6a57dd60a48073fe8a6ff6efc3bd092a9c56c1676906118fd6a007c257dea01719c74df28a6324789530bc06f8285c22e96c39d464a02a9b5c8f00458634de96d6bfb2fd4fbd649d6927da5737c882bec1767b2326c7407b2fa80b2cee86c3123212e5a7c324e053578ab8d172619e228c002df4b15d12f4cc92340e7b5fa82e10546fdbbc5c1402e1baf1979fc38921638d23170cd66a49f9b224801b8c0d3ab2a643362488547519137dde251a376819b2ea307df097f64327e44fbf96c94ce6c12537900e0273479427dc6373b69b1c53cb3c98412b4c1e7414f1bf5b679f960dbcd54e02f4045fbf623eb16f97d6f705e7160a82df1736ea7edb147571827baef59223bccd57d1c399e744e92e60d625a3953b9fad063739d2156a624c4912faad73d6db9c992161adda21bf0d4e06f8686295c6dbb0027ac17de65e1e4186cf5f7f11bc059b48720917a9e6c4df0c02c8c4d289c9ccaf5ba8920423979700dcf8536b4c2cadb6f60ea30238e8094d1203174c140805587e0ead04069f6413e3be987129d175b4bc9a56e6fc960b54906526abb729f0b45685c7b7f90f1aefababcdd2e3911841e71870fc0d758a869b1e5bff24d957f311169ed6f90a8acbe0d58ced23dc9ba1b9b8fbb6eecc706562be200d2ca85117a427c7808257334d4f44b1f96b4048b1a4b4ab871affe0dc242ff343bf5dc980b82b0f87c1d8f3abffc9a207a50efcd9324c7e816d444f31c64efb41a523844b914ee3c02e1d545fe63baf14af4b51a1d82f06aa20c926892f6b2464c73dec9bedcf500f5e3b47bb466148515157c315ed46885e38e249fb049888dc33c97f4bd7f5080eeef22f37ea636d454588543ca54a6b4f0e4d34edc24361597cdc034dbeb96682a25001d19b048e7b718d9d35158506d6612888d14cb722389bc42d04b501208ac4926ccb078db5e30f5493188faebc903ab8d0906bcfd195125ec1c14c1406f6c020a89d6c43e27fe07830e1ace38800751c978bf9d587eaff18a92ed6c7345a5e1cddc5d43d7b7d222e8a0b083cc68a09a3bbc07067518763b539fbd625cf379455b286205b537b973476dcfe975129bf2af1a5963047929e9c5123be820c154ab92b1056fedf0944186a18736db25776ca3aa82b22d3f140fc69c6b5c9ee6211bf60334504ba2759cb9cacfe2b80c0a635334ca35d6bcb31688dae94c85bfdcfba5df8f097bb45aa8a9b42e5bf3af23c4fc855db7f9e0cf24bc08e0fbbb4ce9c58602e9a35193df516fd64fb98da268ff056fa39fd995456228f18f7926b65f4a2af5830ccc9df3e360da00eccaa074fa49f6e93cb5f3faddc03eec021b3e028d1b9ad88bf3a1dc1c015b8cff0163edec96dbaa18390f687e5d0aff059e78e9fd92f7a499146b0bb75cc65c82cad30f069716e2bfae932a612e3e191d0f4c09a2493666b3e3934197cf621134621ddad1fdc4ea47b5a7854ee2888f29c6d4b344af5d27b221d6a6f3a3d0adbb938fae2bb1e8ecf770b0bb2952f0f3f3aee34afaa178aecdc1b3e3188ae0d7a60500962f19c846238487a85224b55d70eb342989ae03316456410d92d42c0fa1349c8421eec2446ebd960682ed52d91c97f691091aeaf908a944e5743ed98be1565d597c2e18f9abf9ae07ae2b2ea344ba83862d7ac9d5b824febab1a387c5e7ff0a4483d9db4f0b9a8fca8be82e49517da99f97edc89d20010a5c70118a9392c71c12d5cbe7cf0ea18b7f9c40dd4713672b88ee09a09bf2ffe0184251be534f72f48b728aa7c326ccae275e8798166e9b772c35d3479fbe1def8873a2a728f4e602e796bb4fe353dd34c93da3d4335193ce2fd56bd489186fb3bf085d0d46b7b9de367cbd5efa8020c", 0x9ab}], 0x1}}], 0x9ab, 0x0) 17:15:31 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) 17:15:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0x0) 17:15:31 executing program 0: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x3, 0x1000}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x103d40, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='macvlan1\x00') sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = accept4$alg(r9, 0x0, 0x0, 0x80800) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r10, 0x8983, &(0x7f00000000c0)={0x3, 'macvlan1\x00', {0x4c1b}, 0x81}) 17:15:31 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:32 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="010000000000000000040000075a940000000000008001832f") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000004380)={0x7fffffff, 0xdc, {0xffffffffffffffff}, {r4}, 0xffffffff, 0x3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000004380)={0x7fffffff, 0xdc, {0xffffffffffffffff}, {r8}, 0xffffffff, 0x3}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100002, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0x200}}, {@mode={'mode'}}], [{@uid_gt={'uid>', r4}}, {@euid_gt={'euid>', r8}}, {@smackfsroot={'smackfsroot', 0x3d, '$'}}]}) 17:15:32 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) [ 2070.858069][T25039] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 2070.858081][T25039] netlink: 18433 bytes leftover after parsing attributes in process `syz-executor.0'. 17:15:32 executing program 0: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x3, 0x1000}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x103d40, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='macvlan1\x00') sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="254800003400056bd25a80648c63940d0324fc60100000000a000a00053582c137153e370948018006001700d1bd", 0x33fe0}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = accept4$alg(r9, 0x0, 0x0, 0x80800) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r10, 0x8983, &(0x7f00000000c0)={0x3, 'macvlan1\x00', {0x4c1b}, 0x81}) 17:15:32 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="010000000000000000040000075a940000000000008001832f") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000004380)={0x7fffffff, 0xdc, {0xffffffffffffffff}, {r4}, 0xffffffff, 0x3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000004380)={0x7fffffff, 0xdc, {0xffffffffffffffff}, {r8}, 0xffffffff, 0x3}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100002, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0x200}}, {@mode={'mode'}}], [{@uid_gt={'uid>', r4}}, {@euid_gt={'euid>', r8}}, {@smackfsroot={'smackfsroot', 0x3d, '$'}}]}) 17:15:32 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:32 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x0) [ 2071.429689][T25055] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 2071.473862][T25055] netlink: 18433 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2071.521063][ T27] kauditd_printk_skb: 204 callbacks suppressed [ 2071.521070][ T27] audit: type=1325 audit(1582391732.721:44968): table=filter family=3 entries=4 [ 2071.600678][ T27] audit: type=1325 audit(1582391732.721:44969): table=filter family=10 entries=4 [ 2071.600697][ T27] audit: type=1325 audit(1582391732.761:44970): table=mangle family=10 entries=6 [ 2071.602682][ T27] audit: type=1325 audit(1582391732.761:44971): table=raw family=10 entries=3 17:15:33 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="010000000000000000040000075a940000000000008001832f") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) syz_open_procfs(r1, &(0x7f0000000200)='net/sockstat6\x00') r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x88d00, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000240)={{0x0, 0x0, @identifier="7163921f81abca2ad6be23ac1f386bb3"}}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000280)={{0x0, 0x2, 0x5, 0x1, 0x8000}}) getsockname(r2, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000180)=0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$SNDRV_PCM_IOCTL_FORWARD(r2, 0x40084149, &(0x7f0000000000)=0x100) [ 2071.602704][ T27] audit: type=1325 audit(1582391732.761:44972): table=security family=10 entries=4 [ 2071.632768][ T27] audit: type=1800 audit(1582391732.831:44973): pid=25062 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16584 res=0 17:15:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:33 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="010000000000000000040000075a940000000000008001832f") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000004380)={0x7fffffff, 0xdc, {0xffffffffffffffff}, {r4}, 0xffffffff, 0x3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000004380)={0x7fffffff, 0xdc, {0xffffffffffffffff}, {r8}, 0xffffffff, 0x3}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100002, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0x200}}, {@mode={'mode'}}], [{@uid_gt={'uid>', r4}}, {@euid_gt={'euid>', r8}}, {@smackfsroot={'smackfsroot', 0x3d, '$'}}]}) [ 2071.779817][ T27] audit: type=1325 audit(1582391732.971:44974): table=mangle family=2 entries=6 [ 2071.785807][ T27] audit: type=1325 audit(1582391732.981:44975): table=raw family=2 entries=3 17:15:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, 0xffffffffffffffff, 0x0, 0x280900) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) [ 2071.787648][ T27] audit: type=1325 audit(1582391732.981:44976): table=security family=2 entries=4 [ 2071.876936][ T27] audit: type=1325 audit(1582391733.071:44977): table=filter family=2 entries=4 17:15:33 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:33 executing program 3: socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:33 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:33 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x0) 17:15:33 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:33 executing program 3: socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:33 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:33 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:34 executing program 3: socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:34 executing program 0: ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:34 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:34 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:34 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:34 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x0) 17:15:34 executing program 0: ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:34 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:34 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:15:34 executing program 0: ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:34 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:15:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:35 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:35 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6", 0x1c}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:35 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:15:35 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:35 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:35 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x40000000002, 0x3, 0x2) dup3(r3, r2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x400000000000030, 0x0) 17:15:35 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8400fffffffa) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:15:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:36 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:36 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:36 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6", 0x1c}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:36 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:36 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:36 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:37 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6", 0x1c}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:37 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:37 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:37 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, r4}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)=ANY=[@ANYRES32=r4, @ANYBLOB="b2000000da7b4a3bccd8c000997572694bcbbb269599563593f1739edeaff069f05e33889db113c65f1e4731c8f5dd7439a6ce77c6944e86ab0ad634d327ce893fa7e768bfb5b6ffe05d466e3576cfffcde75d77581561c8bdcfc6a931bf4f46d2cc74e469d2b094f0c6eb230745102521329260f068495799c42a29760d6a0bf7d1fdb66835b2fb72f8def666b641d0a1cff45ef78bf28fe5847e1a11170be650fe985add3505dc14500a00"/182], &(0x7f0000000040)=0xba) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x3, {0xb32}}, 0x18) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="010000000000000000040000075a940000000000008001832f") r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x105080, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x42, "022e9f4f83ace022ffd8fd69f4d88e2655aca33c775919cbe27d7eb0347341257347b4d3edd388befa38c9e9b0f719a68671896b1462af671eb417da6b1aec507d52"}, &(0x7f0000000280)=0x66) 17:15:37 executing program 1: ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:37 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:37 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="010000000000000000040000075a940000000010008001832f") 17:15:37 executing program 1: ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") [ 2076.601786][ T27] kauditd_printk_skb: 265 callbacks suppressed [ 2076.601793][ T27] audit: type=1325 audit(1582391737.801:45243): table=filter family=2 entries=4 [ 2076.602197][ T27] audit: type=1325 audit(1582391737.801:45244): table=nat family=2 entries=5 [ 2076.606373][ T27] audit: type=1325 audit(1582391737.801:45245): table=mangle family=2 entries=6 [ 2076.606729][ T27] audit: type=1325 audit(1582391737.801:45246): table=raw family=2 entries=3 [ 2076.612379][ T27] audit: type=1325 audit(1582391737.811:45247): table=security family=2 entries=4 [ 2076.683147][ T27] audit: type=1325 audit(1582391737.881:45248): table=security family=10 entries=4 [ 2076.709479][ T27] audit: type=1325 audit(1582391737.901:45249): table=filter family=2 entries=4 [ 2076.713413][ T27] audit: type=1325 audit(1582391737.911:45250): table=nat family=2 entries=5 [ 2076.719249][ T27] audit: type=1325 audit(1582391737.911:45251): table=mangle family=2 entries=6 [ 2076.726838][ T27] audit: type=1325 audit(1582391737.921:45252): table=raw family=2 entries=3 17:15:38 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd", 0x2a}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:38 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:38 executing program 1: ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:38 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, 0x0) 17:15:38 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:38 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, 0x0) 17:15:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:38 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x40000000002, 0x3, 0x2) dup3(r2, r1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) 17:15:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:38 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd", 0x2a}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:38 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:38 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, 0x0) 17:15:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:38 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:39 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:39 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)) 17:15:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:39 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:39 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)) 17:15:39 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd", 0x2a}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, 0x0, 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:39 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:39 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)) 17:15:39 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:39 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:39 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="01000000000000000004000007") 17:15:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, 0x0, 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:40 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") [ 2078.825427][T25354] autofs4:pid:25354:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:40 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="01000000000000000004000007") [ 2079.099132][T25361] autofs4:pid:25361:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:40 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c3", 0x31}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, 0x0, 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:40 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:40 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="01000000000000000004000007") 17:15:40 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2079.437516][T25369] autofs4:pid:25369:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:40 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="010000000000000000040000075a940000000700008001832f") 17:15:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:40 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000") 17:15:40 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, 0x0) 17:15:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) [ 2079.921684][T25393] autofs4:pid:25393:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:41 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c3", 0x31}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:41 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, 0x0) 17:15:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 17:15:41 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000") 17:15:41 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) [ 2080.352655][T25403] autofs4:pid:25403:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:41 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000") 17:15:41 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, 0x0) 17:15:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{0x0}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2080.657032][T25420] autofs4:pid:25420:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:42 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c3", 0x31}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:42 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000100080") 17:15:42 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)) 17:15:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{0x0}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x66}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:15:42 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:42 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:42 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)) [ 2081.188909][T25438] autofs4:pid:25438:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{0x0}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:42 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000100080") 17:15:42 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)) 17:15:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) [ 2081.564207][T25456] autofs4:pid:25456:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) [ 2081.696707][ T27] kauditd_printk_skb: 240 callbacks suppressed [ 2081.696714][ T27] audit: type=1325 audit(1582391742.891:45493): table=filter family=2 entries=4 [ 2081.697218][ T27] audit: type=1325 audit(1582391742.891:45494): table=nat family=2 entries=5 [ 2081.697802][ T27] audit: type=1325 audit(1582391742.891:45495): table=mangle family=2 entries=6 [ 2081.698249][ T27] audit: type=1325 audit(1582391742.891:45496): table=raw family=2 entries=3 [ 2081.707438][ T27] audit: type=1325 audit(1582391742.901:45497): table=security family=2 entries=4 [ 2081.719018][ T27] audit: type=1325 audit(1582391742.911:45498): table=filter family=10 entries=4 [ 2081.719559][ T27] audit: type=1325 audit(1582391742.911:45499): table=mangle family=10 entries=6 17:15:43 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d628", 0x34}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:43 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000100080") 17:15:43 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="01000000000000000004000007") 17:15:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) [ 2081.726926][ T27] audit: type=1325 audit(1582391742.921:45500): table=raw family=10 entries=3 [ 2081.727610][ T27] audit: type=1325 audit(1582391742.921:45501): table=security family=10 entries=4 17:15:43 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2082.233293][T25469] autofs4:pid:25469:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) [ 2082.245080][T25468] autofs4:pid:25468:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) [ 2082.315911][ T27] audit: type=1325 audit(1582391743.511:45502): table=filter family=2 entries=4 17:15:43 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:43 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a94000000001000800183") 17:15:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:43 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="01000000000000000004000007") [ 2082.545623][T25483] autofs4:pid:25483:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) [ 2082.558071][T25484] autofs4:pid:25484:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:43 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:43 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="01000000000000000004000007") [ 2082.875640][T25496] autofs4:pid:25496:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:44 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d628", 0x34}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:44 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a94000000001000800183") 17:15:44 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000007") [ 2083.116872][T25502] autofs4:pid:25502:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) [ 2083.144614][T25503] autofs4:pid:25503:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:44 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000007") 17:15:44 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a94000000001000800183") 17:15:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:44 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000007") [ 2083.459349][T25516] autofs4:pid:25516:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) [ 2083.487849][T25518] autofs4:pid:25518:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:44 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:44 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") 17:15:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) [ 2083.664270][T25521] autofs4:pid:25521:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:45 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d628", 0x34}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:45 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000007000080") 17:15:45 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:45 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") 17:15:45 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2084.067287][T25539] autofs4:pid:25539:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:45 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000007000080") 17:15:45 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:45 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") [ 2084.295499][T25548] autofs4:pid:25548:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:45 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000007000080") 17:15:45 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:45 executing program 0: ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") [ 2084.487949][T25556] autofs4:pid:25556:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:46 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f0", 0x36}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:46 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a94000000070000800183") [ 2084.898238][T25567] autofs4:pid:25567:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:46 executing program 0: ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") 17:15:46 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a94000000070000800183") 17:15:46 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:46 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a94000000070000800183") 17:15:46 executing program 0: ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") [ 2085.120357][T25574] autofs4:pid:25574:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) [ 2085.307548][T25585] autofs4:pid:25585:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:46 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") 17:15:46 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, 0x0, 0xfc) 17:15:46 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") 17:15:47 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f0", 0x36}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:47 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") 17:15:47 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:47 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") 17:15:47 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") 17:15:47 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:47 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:47 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") 17:15:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, 0x0, 0xfc) 17:15:47 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") 17:15:47 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f0", 0x36}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:48 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") [ 2086.939043][ T27] kauditd_printk_skb: 212 callbacks suppressed [ 2086.939051][ T27] audit: type=1325 audit(1582391748.131:45715): table=filter family=2 entries=4 17:15:48 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:48 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="010000000000000000040000075a940000000003008001832f") [ 2086.939469][ T27] audit: type=1325 audit(1582391748.131:45716): table=nat family=2 entries=5 [ 2086.944248][ T27] audit: type=1325 audit(1582391748.141:45717): table=mangle family=2 entries=6 [ 2086.947965][ T27] audit: type=1325 audit(1582391748.141:45718): table=raw family=2 entries=3 [ 2086.964836][ T27] audit: type=1325 audit(1582391748.151:45719): table=security family=2 entries=4 [ 2087.184716][ T27] audit: type=1325 audit(1582391748.371:45720): table=filter family=10 entries=4 17:15:48 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:48 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, 0x0) [ 2087.191236][ T27] audit: type=1325 audit(1582391748.391:45721): table=mangle family=10 entries=6 17:15:48 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2087.191744][ T27] audit: type=1325 audit(1582391748.391:45722): table=raw family=10 entries=3 17:15:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, 0x0, 0xfc) [ 2087.193134][ T27] audit: type=1325 audit(1582391748.391:45723): table=filter family=2 entries=4 [ 2087.197294][ T27] audit: type=1325 audit(1582391748.391:45724): table=nat family=2 entries=5 17:15:48 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, 0x0) 17:15:48 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, 0x0) 17:15:48 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:49 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)) 17:15:49 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)) 17:15:49 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:49 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)) 17:15:49 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:49 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="01000000000000000004000007") 17:15:49 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:49 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) [ 2088.595670][T25670] autofs4:pid:25670:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) 17:15:50 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:50 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="01000000000000000004000007") 17:15:50 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0xfc) [ 2088.982597][T25689] autofs4:pid:25689:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:50 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:50 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:50 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b316c", 0xff7c}], 0x1) 17:15:50 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="01000000000000000004000007") 17:15:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, 0x0}, 0xfc) 17:15:50 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2089.762961][T25706] autofs4:pid:25706:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:51 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, 0x0, 0x0) 17:15:51 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:51 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000") 17:15:51 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, 0x0, 0x0) 17:15:51 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, 0x0, 0x0) [ 2090.094957][T25721] autofs4:pid:25721:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:51 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000") [ 2090.357774][T25729] autofs4:pid:25729:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:52 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:52 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0), 0x0) 17:15:52 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000") 17:15:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, 0x0}, 0xfc) 17:15:52 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:52 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2091.149418][T25742] autofs4:pid:25742:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:52 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0), 0x0) 17:15:52 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000030080") 17:15:52 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0), 0x0) [ 2091.433734][T25751] autofs4:pid:25751:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:52 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000030080") 17:15:52 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{0x0}], 0x1) [ 2091.632861][T25756] autofs4:pid:25756:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:52 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2092.016070][ T27] kauditd_printk_skb: 191 callbacks suppressed [ 2092.016121][ T27] audit: type=1325 audit(1582391753.211:45916): table=filter family=2 entries=4 [ 2092.082608][ T27] audit: type=1325 audit(1582391753.211:45917): table=mangle family=2 entries=6 [ 2092.125661][ T27] audit: type=1325 audit(1582391753.211:45918): table=raw family=2 entries=3 [ 2092.165260][ T27] audit: type=1325 audit(1582391753.211:45919): table=security family=2 entries=4 [ 2092.210048][ T27] audit: type=1325 audit(1582391753.211:45920): table=filter family=10 entries=4 [ 2092.244267][ T27] audit: type=1325 audit(1582391753.211:45921): table=mangle family=10 entries=6 [ 2092.264975][ T27] audit: type=1325 audit(1582391753.211:45922): table=raw family=10 entries=3 [ 2092.288687][ T27] audit: type=1325 audit(1582391753.211:45923): table=security family=10 entries=4 [ 2092.312791][ T27] audit: type=1325 audit(1582391753.271:45924): table=filter family=3 entries=4 [ 2092.338173][ T27] audit: type=1325 audit(1582391753.271:45925): table=filter family=10 entries=4 17:15:53 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{0x0}], 0x1) 17:15:53 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:53 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a9400000000030080") 17:15:53 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, 0x0}, 0xfc) 17:15:53 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:53 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2092.723857][T25776] autofs4:pid:25776:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:54 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{0x0}], 0x1) 17:15:54 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a94000000000300800183") 17:15:54 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)}], 0x1) [ 2092.965033][T25785] autofs4:pid:25785:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:54 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:54 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)}], 0x1) 17:15:54 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a94000000000300800183") 17:15:54 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)}], 0x1) [ 2093.295740][T25796] autofs4:pid:25796:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:54 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:54 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a94000000000300800183") 17:15:54 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4", 0x29}], 0x1) 17:15:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)}, 0xfc) [ 2093.720962][T25807] autofs4:pid:25807:validate_dev_ioctl: invalid path supplied for cmd(0x00009374) 17:15:55 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:55 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:55 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:55 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4", 0x29}], 0x1) 17:15:55 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:55 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4", 0x29}], 0x1) 17:15:55 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)}, 0xfc) 17:15:56 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6a", 0x3e}], 0x1) 17:15:56 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6a", 0x3e}], 0x1) 17:15:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:56 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:56 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:56 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6a", 0x3e}], 0x1) 17:15:56 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:56 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)}, 0xfc) 17:15:56 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a26", 0x48}], 0x1) 17:15:57 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:57 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a26", 0x48}], 0x1) 17:15:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:57 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a26", 0x48}], 0x1) 17:15:57 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0", 0x4d}], 0x1) 17:15:57 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{0x0}], 0x1}, 0xfc) 17:15:57 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:57 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:58 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:15:58 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0", 0x4d}], 0x1) 17:15:58 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0", 0x4d}], 0x1) 17:15:58 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b", 0x50}], 0x1) 17:15:58 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{0x0}], 0x1}, 0xfc) 17:15:58 executing program 3: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2097.611909][ T27] kauditd_printk_skb: 141 callbacks suppressed [ 2097.611916][ T27] audit: type=1325 audit(1582391758.811:46067): table=filter family=10 entries=4 17:15:58 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b", 0x50}], 0x1) [ 2097.672402][ T27] audit: type=1325 audit(1582391758.811:46068): table=mangle family=10 entries=6 [ 2097.739505][ T27] audit: type=1325 audit(1582391758.811:46069): table=raw family=10 entries=3 17:15:59 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2097.797697][ T27] audit: type=1325 audit(1582391758.811:46070): table=security family=10 entries=4 [ 2097.797739][ T27] audit: type=1325 audit(1582391758.841:46071): table=filter family=2 entries=4 [ 2097.797757][ T27] audit: type=1325 audit(1582391758.841:46072): table=nat family=2 entries=5 [ 2097.797774][ T27] audit: type=1325 audit(1582391758.841:46073): table=mangle family=2 entries=6 17:15:59 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2097.797793][ T27] audit: type=1325 audit(1582391758.841:46074): table=raw family=2 entries=3 [ 2097.797809][ T27] audit: type=1325 audit(1582391758.841:46075): table=security family=2 entries=4 [ 2097.919833][ T27] audit: type=1325 audit(1582391759.111:46076): table=filter family=2 entries=4 17:15:59 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:00 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:00 executing program 3: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:00 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b", 0x50}], 0x1) 17:16:00 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{0x0}], 0x1}, 0xfc) 17:16:00 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:00 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b31", 0x51}], 0x1) 17:16:00 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:00 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b31", 0x51}], 0x1) 17:16:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:00 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="0fbf63739bd78394263b4acbe75993c6b2b9f0b256fb851969a6c4c6ff48489e10bb4019b7b4201cffbd8d37994f53a6c391d62803f009", 0x37}], 0x1}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b40d9b31", 0x51}], 0x1) 17:16:00 executing program 3: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:01 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)}], 0x1}, 0xfc) 17:16:01 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:01 executing program 3: set_mempolicy(0x2, 0x0, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:01 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:02 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:02 executing program 3: set_mempolicy(0x2, 0x0, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:02 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:02 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)}], 0x1}, 0xfc) 17:16:03 executing program 3: set_mempolicy(0x2, 0x0, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:03 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)}], 0x1}, 0xfc) 17:16:03 executing program 1: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:03 executing program 1: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:04 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2102.870217][ T27] kauditd_printk_skb: 127 callbacks suppressed [ 2102.870224][ T27] audit: type=1325 audit(1582391764.071:46204): table=filter family=2 entries=4 [ 2102.934772][ T27] audit: type=1325 audit(1582391764.091:46205): table=nat family=2 entries=5 [ 2102.992546][ T27] audit: type=1325 audit(1582391764.091:46206): table=mangle family=2 entries=6 [ 2103.054437][ T27] audit: type=1325 audit(1582391764.091:46207): table=raw family=2 entries=3 [ 2103.096447][ T27] audit: type=1325 audit(1582391764.101:46208): table=security family=2 entries=4 [ 2103.143309][ T27] audit: type=1325 audit(1582391764.341:46209): table=filter family=2 entries=4 [ 2103.167278][ T27] audit: type=1325 audit(1582391764.341:46210): table=nat family=2 entries=5 [ 2103.205017][ T27] audit: type=1325 audit(1582391764.341:46211): table=mangle family=2 entries=6 [ 2103.237357][ T27] audit: type=1325 audit(1582391764.351:46212): table=raw family=2 entries=3 [ 2103.261616][ T27] audit: type=1325 audit(1582391764.351:46213): table=security family=2 entries=4 17:16:05 executing program 5: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:05 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:05 executing program 1: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:06 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:06 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:06 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0) 17:16:06 executing program 5: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:06 executing program 1: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:06 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:06 executing program 1: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:06 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:06 executing program 5: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:06 executing program 4: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:07 executing program 1: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:07 executing program 5: set_mempolicy(0x2, 0x0, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:08 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:08 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:08 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:08 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:08 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:08 executing program 5: set_mempolicy(0x2, 0x0, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:08 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:09 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2107.798216][T26062] syz-executor.0: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz0,mems_allowed=0-1 17:16:09 executing program 5: set_mempolicy(0x2, 0x0, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2107.887237][ T27] kauditd_printk_skb: 87 callbacks suppressed [ 2107.887244][ T27] audit: type=1325 audit(1582391769.081:46301): table=nat family=2 entries=5 [ 2107.893573][T26062] CPU: 1 PID: 26062 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 2107.911022][T26062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2107.921066][T26062] Call Trace: [ 2107.924355][T26062] dump_stack+0x1fb/0x318 [ 2107.928739][T26062] warn_alloc+0x17d/0x2c0 [ 2107.933080][T26062] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2107.939518][T26062] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2107.945112][T26062] ? __next_zones_zonelist+0xb0/0x170 [ 2107.950527][T26062] __alloc_pages_nodemask+0x39a/0x5d0 [ 2107.955921][T26062] alloc_pages_current+0x2db/0x500 [ 2107.957507][ T27] audit: type=1325 audit(1582391769.081:46302): table=mangle family=2 entries=6 [ 2107.961176][T26062] ion_page_pool_alloc+0x4be/0x5e0 [ 2107.961212][T26062] ion_system_heap_allocate+0x210/0xb90 [ 2107.961244][T26062] ion_ioctl+0x45f/0x10a0 [ 2107.961282][T26062] ? debug_shrink_set+0x130/0x130 [ 2107.961299][T26062] __se_sys_ioctl+0x113/0x190 [ 2107.995080][T26062] __x64_sys_ioctl+0x7b/0x90 [ 2107.999672][T26062] do_syscall_64+0xf7/0x1c0 [ 2108.004224][T26062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.010119][T26062] RIP: 0033:0x45c429 [ 2108.014016][T26062] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2108.033628][T26062] RSP: 002b:00007f5029792c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2108.042045][T26062] RAX: ffffffffffffffda RBX: 00007f50297936d4 RCX: 000000000045c429 [ 2108.044179][ T27] audit: type=1325 audit(1582391769.231:46303): table=raw family=2 entries=3 [ 2108.050007][T26062] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 2108.050013][T26062] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2108.050019][T26062] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2108.050025][T26062] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c 17:16:09 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2108.363454][ T27] audit: type=1325 audit(1582391769.231:46304): table=security family=2 entries=4 [ 2108.402643][T26062] Mem-Info: [ 2108.406050][T26062] active_anon:178044 inactive_anon:231 isolated_anon:26 [ 2108.406050][T26062] active_file:10349 inactive_file:9746 isolated_file:14 [ 2108.406050][T26062] unevictable:0 dirty:117 writeback:0 unstable:0 [ 2108.406050][T26062] slab_reclaimable:18088 slab_unreclaimable:131140 [ 2108.406050][T26062] mapped:60153 shmem:303 pagetables:3152 bounce:0 [ 2108.406050][T26062] free:820633 free_pcp:351 free_cma:0 [ 2108.474720][ T27] audit: type=1325 audit(1582391769.251:46305): table=filter family=10 entries=4 [ 2108.522247][ T27] audit: type=1325 audit(1582391769.251:46306): table=mangle family=10 entries=6 [ 2108.568596][ T27] audit: type=1325 audit(1582391769.261:46307): table=raw family=10 entries=3 17:16:09 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2108.616635][ T27] audit: type=1325 audit(1582391769.261:46308): table=security family=10 entries=4 [ 2108.643547][T26062] Node 0 active_anon:703464kB inactive_anon:924kB active_file:29820kB inactive_file:43124kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:240548kB dirty:484kB writeback:0kB shmem:1212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 450560kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2108.697979][ T27] audit: type=1325 audit(1582391769.381:46309): table=filter family=10 entries=4 17:16:09 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2108.759413][ T27] audit: type=1325 audit(1582391769.381:46310): table=mangle family=10 entries=6 [ 2108.872841][T26062] Node 0 DMA free:10520kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2109.006849][T26062] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2109.036058][T26062] Node 0 DMA32 free:135816kB min:117892kB low:126960kB high:136028kB reserved_highatomic:2048KB active_anon:705672kB inactive_anon:924kB active_file:29820kB inactive_file:39600kB unevictable:0kB writepending:480kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10640kB pagetables:12208kB bounce:0kB free_pcp:2464kB local_pcp:1032kB free_cma:0kB [ 2109.185166][T26062] lowmem_reserve[]: 0 0 0 0 0 [ 2109.212719][T26062] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2109.250170][T26062] lowmem_reserve[]: 0 0 0 0 0 [ 2109.260382][T26062] Node 0 DMA: 4*4kB (U) 20*8kB (U) 10*16kB (U) 9*32kB (U) 1*64kB (U) 1*128kB (U) 0*256kB 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10544kB [ 2109.390153][T26062] Node 0 DMA32: 1681*4kB (UMEH) 4088*8kB (UMEH) 2551*16kB (UMEH) 1665*32kB (UMH) 43*64kB (UMH) 19*128kB (UMH) 9*256kB (MH) 3*512kB (M) 19*1024kB (U) 0*2048kB 0*4096kB = 162004kB [ 2109.435120][T26062] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2109.473868][T26062] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2109.505249][T26062] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2109.537735][T26062] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2109.569781][T26062] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2109.599542][T26062] 9529 total pagecache pages [ 2109.616838][T26062] 0 pages in swap cache [ 2109.631144][T26062] Swap cache stats: add 0, delete 0, find 0/0 [ 2109.656922][T26062] Free swap = 0kB 17:16:10 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2109.670325][T26062] Total swap = 0kB [ 2109.675937][T26062] 1965979 pages RAM [ 2109.710182][T26062] 0 pages HighMem/MovableOnly [ 2109.751778][T26062] 339072 pages reserved [ 2109.790961][T26062] 0 pages cma reserved 17:16:11 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:11 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:11 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:11 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:11 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:11 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:12 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:12 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:12 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:12 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:12 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:12 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:12 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:12 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:13 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:13 executing program 0: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:13 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:13 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2113.038665][ T27] kauditd_printk_skb: 92 callbacks suppressed [ 2113.038672][ T27] audit: type=1325 audit(1582391774.231:46403): table=filter family=2 entries=4 [ 2113.107181][ T27] audit: type=1325 audit(1582391774.231:46404): table=nat family=2 entries=5 [ 2113.166067][ T27] audit: type=1325 audit(1582391774.231:46405): table=mangle family=2 entries=6 17:16:14 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:14 executing program 0: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:14 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:14 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:14 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2113.229861][ T27] audit: type=1325 audit(1582391774.231:46406): table=raw family=2 entries=3 [ 2113.239297][ T27] audit: type=1325 audit(1582391774.231:46407): table=security family=2 entries=4 [ 2113.302062][ T27] audit: type=1325 audit(1582391774.271:46408): table=filter family=10 entries=4 [ 2113.388046][ T27] audit: type=1325 audit(1582391774.271:46409): table=mangle family=10 entries=6 [ 2113.448782][ T27] audit: type=1325 audit(1582391774.271:46410): table=raw family=10 entries=3 [ 2113.504845][ T27] audit: type=1325 audit(1582391774.271:46411): table=security family=10 entries=4 [ 2113.552959][ T27] audit: type=1325 audit(1582391774.391:46412): table=filter family=2 entries=4 17:16:15 executing program 0: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:15 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:15 executing program 0: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:16 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:16 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:16 executing program 0: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:16 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:16 executing program 0: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:16 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:17 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:17 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:17 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:17 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:17 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:17 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:17 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:17 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:17 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:17 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:18 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:18 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:18 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:18 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:18 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:18 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:18 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:18 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:19 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:19 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:19 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, 0x0) 17:16:19 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:19 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2118.214573][ T27] kauditd_printk_skb: 127 callbacks suppressed [ 2118.214581][ T27] audit: type=1325 audit(1582391779.411:46540): table=filter family=2 entries=4 [ 2118.290872][ T27] audit: type=1325 audit(1582391779.411:46541): table=mangle family=2 entries=6 [ 2118.350693][ T27] audit: type=1325 audit(1582391779.421:46542): table=raw family=2 entries=3 [ 2118.397677][ T27] audit: type=1325 audit(1582391779.421:46543): table=security family=2 entries=4 [ 2118.448303][ T27] audit: type=1325 audit(1582391779.421:46544): table=filter family=10 entries=4 [ 2118.497529][ T27] audit: type=1325 audit(1582391779.431:46545): table=mangle family=10 entries=6 [ 2118.545779][ T27] audit: type=1325 audit(1582391779.441:46546): table=raw family=10 entries=3 [ 2118.574592][ T27] audit: type=1325 audit(1582391779.441:46547): table=security family=10 entries=4 [ 2118.603389][ T27] audit: type=1325 audit(1582391779.511:46548): table=filter family=2 entries=4 [ 2118.639019][ T27] audit: type=1325 audit(1582391779.511:46549): table=nat family=2 entries=5 17:16:20 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:20 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, 0x0) 17:16:20 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:20 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:20 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:20 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, 0x0) 17:16:20 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:20 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:20 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:20 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:20 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:21 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:22 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:22 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:22 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:22 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:22 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:22 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:22 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:22 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:22 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:22 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:22 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:22 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2121.636400][T26303] warn_alloc: 2 callbacks suppressed [ 2121.636417][T26303] syz-executor.4: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz4,mems_allowed=0-1 [ 2121.730123][T26303] CPU: 0 PID: 26303 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0 [ 2121.738865][T26303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2121.748921][T26303] Call Trace: [ 2121.752226][T26303] dump_stack+0x1fb/0x318 [ 2121.756569][T26303] warn_alloc+0x17d/0x2c0 [ 2121.760911][T26303] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2121.767344][T26303] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2121.772910][T26303] ? __next_zones_zonelist+0xb0/0x170 [ 2121.778316][T26303] __alloc_pages_nodemask+0x39a/0x5d0 [ 2121.783713][T26303] alloc_pages_current+0x2db/0x500 [ 2121.788836][T26303] ion_page_pool_alloc+0x4be/0x5e0 [ 2121.793955][T26303] ion_system_heap_allocate+0x210/0xb90 [ 2121.799521][T26303] ion_ioctl+0x45f/0x10a0 [ 2121.803886][T26303] ? debug_shrink_set+0x130/0x130 [ 2121.808915][T26303] __se_sys_ioctl+0x113/0x190 [ 2121.813610][T26303] __x64_sys_ioctl+0x7b/0x90 [ 2121.818205][T26303] do_syscall_64+0xf7/0x1c0 [ 2121.822749][T26303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2121.828638][T26303] RIP: 0033:0x45c429 [ 2121.832524][T26303] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2121.852134][T26303] RSP: 002b:00007f597e297c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2121.860552][T26303] RAX: ffffffffffffffda RBX: 00007f597e2986d4 RCX: 000000000045c429 [ 2121.868562][T26303] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 2121.876653][T26303] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2121.884628][T26303] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2121.892603][T26303] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2122.010963][T26303] Mem-Info: [ 2122.018211][T26303] active_anon:179748 inactive_anon:229 isolated_anon:12 [ 2122.018211][T26303] active_file:7618 inactive_file:3086 isolated_file:0 [ 2122.018211][T26303] unevictable:0 dirty:63 writeback:0 unstable:0 [ 2122.018211][T26303] slab_reclaimable:17919 slab_unreclaimable:130963 [ 2122.018211][T26303] mapped:59283 shmem:303 pagetables:3125 bounce:0 [ 2122.018211][T26303] free:903320 free_pcp:78 free_cma:0 [ 2122.136294][T26303] Node 0 active_anon:709820kB inactive_anon:916kB active_file:30184kB inactive_file:11804kB unevictable:0kB isolated(anon):48kB isolated(file):0kB mapped:237068kB dirty:252kB writeback:0kB shmem:1212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 454656kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2122.196116][T26303] Node 0 DMA free:10808kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2122.330514][T26303] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2122.358620][T26303] Node 0 DMA32 free:159284kB min:40372kB low:49440kB high:58508kB reserved_highatomic:2048KB active_anon:707852kB inactive_anon:916kB active_file:30176kB inactive_file:11804kB unevictable:0kB writepending:248kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10492kB pagetables:12048kB bounce:0kB free_pcp:880kB local_pcp:276kB free_cma:0kB [ 2122.501741][T26303] lowmem_reserve[]: 0 0 0 0 0 [ 2122.535068][T26303] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:8kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2122.600232][T26303] lowmem_reserve[]: 0 0 0 0 0 [ 2122.605088][T26303] Node 0 DMA: 8*4kB (UE) 19*8kB (UE) 28*16kB (UE) 18*32kB (U) 7*64kB (UE) 3*128kB (UE) 3*256kB (UE) 1*512kB (E) 2*1024kB (UE) 3*2048kB (UME) 0*4096kB = 11512kB [ 2122.660412][T26303] Node 0 DMA32: 640*4kB (UMEH) 896*8kB (UMEH) 341*16kB (UH) 1509*32kB (UH) 8*64kB (UMH) 7*128kB (UH) 115*256kB (UH) 86*512kB (U) 7*1024kB (U) 7*2048kB (UM) 0*4096kB = 159856kB [ 2122.723420][T26303] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2122.760107][T26303] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2122.774437][T26303] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2122.796989][T26303] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2122.818253][T26303] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2122.842600][T26303] 8645 total pagecache pages [ 2122.855284][T26303] 0 pages in swap cache [ 2122.868190][T26303] Swap cache stats: add 0, delete 0, find 0/0 [ 2122.886249][T26303] Free swap = 0kB [ 2122.897473][T26303] Total swap = 0kB [ 2122.907875][T26303] 1965979 pages RAM [ 2122.924511][T26303] 0 pages HighMem/MovableOnly [ 2122.935456][T26303] 339072 pages reserved [ 2122.945969][T26303] 0 pages cma reserved 17:16:24 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:24 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:24 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:24 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:24 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2123.379278][ T27] kauditd_printk_skb: 108 callbacks suppressed [ 2123.379285][ T27] audit: type=1325 audit(1582391784.571:46658): table=filter family=10 entries=4 [ 2123.452672][ T27] audit: type=1325 audit(1582391784.571:46659): table=mangle family=10 entries=6 17:16:24 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:24 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2123.524755][ T27] audit: type=1325 audit(1582391784.571:46660): table=raw family=10 entries=3 [ 2123.589308][ T27] audit: type=1325 audit(1582391784.571:46661): table=security family=10 entries=4 [ 2123.644687][ T27] audit: type=1325 audit(1582391784.751:46662): table=filter family=3 entries=4 17:16:24 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2123.704897][ T27] audit: type=1325 audit(1582391784.751:46663): table=filter family=2 entries=4 [ 2123.777900][ T27] audit: type=1325 audit(1582391784.751:46664): table=nat family=2 entries=5 [ 2123.809562][ T27] audit: type=1325 audit(1582391784.751:46665): table=mangle family=2 entries=6 [ 2123.859137][ T27] audit: type=1325 audit(1582391784.751:46666): table=raw family=2 entries=3 [ 2123.910179][ T27] audit: type=1325 audit(1582391784.751:46667): table=security family=2 entries=4 17:16:25 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:25 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:25 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:25 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:25 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:25 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:25 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:25 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:26 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:26 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:26 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:26 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:26 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:26 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:26 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:26 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:26 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:26 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:26 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:26 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:27 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:27 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:27 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, 0x0) 17:16:27 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:27 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:27 executing program 2: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:27 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:27 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, 0x0) 17:16:27 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:27 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:27 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, 0x0) 17:16:27 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:28 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:28 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:28 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, 0x0) 17:16:28 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:28 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:28 executing program 2: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:28 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:28 executing program 2: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:29 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:29 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, 0x0) 17:16:29 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:29 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:29 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, 0x0) 17:16:29 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:29 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:29 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:29 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:29 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:29 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) [ 2128.478986][ T27] kauditd_printk_skb: 229 callbacks suppressed [ 2128.478993][ T27] audit: type=1325 audit(1582391789.671:46897): table=security family=10 entries=4 [ 2128.586585][ T27] audit: type=1325 audit(1582391789.751:46898): table=filter family=2 entries=4 17:16:29 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:29 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005}) [ 2128.656711][ T27] audit: type=1325 audit(1582391789.751:46899): table=nat family=2 entries=5 17:16:29 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) [ 2128.701800][ T27] audit: type=1325 audit(1582391789.751:46900): table=mangle family=2 entries=6 [ 2128.765510][ T27] audit: type=1325 audit(1582391789.761:46901): table=raw family=2 entries=3 [ 2128.820293][ T27] audit: type=1325 audit(1582391789.761:46902): table=security family=2 entries=4 17:16:30 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005}) [ 2128.884177][ T27] audit: type=1325 audit(1582391789.871:46903): table=security family=10 entries=4 [ 2128.971635][ T27] audit: type=1325 audit(1582391789.921:46904): table=filter family=2 entries=4 [ 2129.039994][ T27] audit: type=1325 audit(1582391789.921:46905): table=mangle family=2 entries=6 [ 2129.071496][ T27] audit: type=1325 audit(1582391789.941:46906): table=raw family=2 entries=3 17:16:30 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:30 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:31 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:31 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:31 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:31 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:31 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:31 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:31 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:31 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:32 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:32 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:32 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:33 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:33 executing program 4: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:33 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:33 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:33 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:34 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:34 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:34 executing program 4: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:35 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2133.857456][ T27] kauditd_printk_skb: 113 callbacks suppressed [ 2133.857464][ T27] audit: type=1325 audit(1582391795.051:47020): table=filter family=3 entries=4 17:16:35 executing program 4: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:35 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:35 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2134.060152][ T27] audit: type=1325 audit(1582391795.251:47021): table=filter family=3 entries=4 [ 2134.069384][ T27] audit: type=1325 audit(1582391795.251:47022): table=filter family=10 entries=4 [ 2134.172168][ T27] audit: type=1325 audit(1582391795.281:47023): table=mangle family=10 entries=6 [ 2134.230229][ T27] audit: type=1325 audit(1582391795.281:47024): table=raw family=10 entries=3 [ 2134.282263][ T27] audit: type=1325 audit(1582391795.281:47025): table=security family=10 entries=4 17:16:35 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:35 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2134.484132][ T27] audit: type=1325 audit(1582391795.681:47026): table=filter family=2 entries=4 [ 2134.540070][ T27] audit: type=1325 audit(1582391795.681:47027): table=mangle family=2 entries=6 [ 2134.597661][ T27] audit: type=1325 audit(1582391795.681:47028): table=raw family=2 entries=3 17:16:35 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2134.667951][ T27] audit: type=1325 audit(1582391795.681:47029): table=security family=2 entries=4 17:16:36 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:36 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:36 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2135.278403][T26681] warn_alloc: 2 callbacks suppressed [ 2135.278417][T26681] syz-executor.1: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz1,mems_allowed=0-1 [ 2135.322983][T26681] CPU: 0 PID: 26681 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 2135.331674][T26681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2135.341739][T26681] Call Trace: [ 2135.345027][T26681] dump_stack+0x1fb/0x318 [ 2135.349364][T26681] warn_alloc+0x17d/0x2c0 [ 2135.353695][T26681] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2135.360127][T26681] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2135.365709][T26681] ? __next_zones_zonelist+0xb0/0x170 [ 2135.371129][T26681] __alloc_pages_nodemask+0x39a/0x5d0 [ 2135.376534][T26681] alloc_pages_current+0x2db/0x500 [ 2135.381681][T26681] ion_page_pool_alloc+0x4be/0x5e0 [ 2135.386811][T26681] ion_system_heap_allocate+0x210/0xb90 [ 2135.392370][T26681] ion_ioctl+0x45f/0x10a0 [ 2135.396785][T26681] ? debug_shrink_set+0x130/0x130 [ 2135.401822][T26681] __se_sys_ioctl+0x113/0x190 [ 2135.406545][T26681] __x64_sys_ioctl+0x7b/0x90 [ 2135.411145][T26681] do_syscall_64+0xf7/0x1c0 [ 2135.415651][T26681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2135.421539][T26681] RIP: 0033:0x45c429 [ 2135.425449][T26681] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2135.445064][T26681] RSP: 002b:00007fae8b985c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2135.453498][T26681] RAX: ffffffffffffffda RBX: 00007fae8b9866d4 RCX: 000000000045c429 [ 2135.461467][T26681] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 2135.469450][T26681] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2135.477527][T26681] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2135.485519][T26681] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c 17:16:36 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:36 executing program 4: set_mempolicy(0x2, 0x0, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:36 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:36 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:36 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2135.520436][T26681] Mem-Info: [ 2135.545764][T26681] active_anon:179473 inactive_anon:231 isolated_anon:0 [ 2135.545764][T26681] active_file:7118 inactive_file:758 isolated_file:0 [ 2135.545764][T26681] unevictable:0 dirty:91 writeback:0 unstable:0 [ 2135.545764][T26681] slab_reclaimable:17604 slab_unreclaimable:131836 [ 2135.545764][T26681] mapped:58549 shmem:303 pagetables:3114 bounce:0 [ 2135.545764][T26681] free:980685 free_pcp:378 free_cma:0 17:16:36 executing program 4: set_mempolicy(0x2, 0x0, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2135.610106][T26681] Node 0 active_anon:712852kB inactive_anon:920kB active_file:28184kB inactive_file:2492kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234132kB dirty:364kB writeback:0kB shmem:1208kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 448512kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 17:16:36 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:36 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:36 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:37 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:37 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) [ 2135.889982][T26681] Node 0 DMA free:10496kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2136.080039][T26681] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2136.106067][T26681] Node 0 DMA32 free:121628kB min:87476kB low:96544kB high:105612kB reserved_highatomic:2048KB active_anon:706588kB inactive_anon:920kB active_file:24072kB inactive_file:6600kB unevictable:0kB writepending:360kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10672kB pagetables:11908kB bounce:0kB free_pcp:620kB local_pcp:512kB free_cma:0kB [ 2136.240225][T26681] lowmem_reserve[]: 0 0 0 0 0 [ 2136.245220][T26681] Node 0 Normal free:4kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2136.330211][T26681] lowmem_reserve[]: 0 0 0 0 0 [ 2136.357840][T26681] Node 0 DMA: 18*4kB (UE) 19*8kB (UE) 4*16kB (UE) 1*32kB (U) 1*64kB (E) 3*128kB (UE) 6*256kB (UE) 2*512kB (UE) 1*1024kB (E) 3*2048kB (UME) 0*4096kB = 10496kB [ 2136.410029][T26681] Node 0 DMA32: 463*4kB (UMEH) 68*8kB (UMEH) 2240*16kB (UEH) 1386*32kB (UMH) 5*64kB (H) 2*128kB (UH) 3*256kB (UH) 10*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 89052kB [ 2136.479549][T26681] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2136.519626][T26681] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2136.560230][T26681] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2136.569516][T26681] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2136.689078][T26681] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2136.770115][T26681] 7476 total pagecache pages [ 2136.774853][T26681] 0 pages in swap cache [ 2136.779310][T26681] Swap cache stats: add 0, delete 0, find 0/0 [ 2136.803808][T26681] Free swap = 0kB [ 2136.808616][T26681] Total swap = 0kB [ 2136.828179][T26681] 1965979 pages RAM [ 2136.837609][T26681] 0 pages HighMem/MovableOnly [ 2136.865716][T26681] 339072 pages reserved [ 2136.875573][T26681] 0 pages cma reserved 17:16:38 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:38 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:38 executing program 4: set_mempolicy(0x2, 0x0, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:38 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:38 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:38 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:38 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:38 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:38 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:38 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:38 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:38 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:39 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:39 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:39 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:39 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:39 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:39 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:39 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:39 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:40 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:40 executing program 3: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:40 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2139.041417][ T27] kauditd_printk_skb: 134 callbacks suppressed [ 2139.041424][ T27] audit: type=1325 audit(1582391800.241:47164): table=filter family=2 entries=4 [ 2139.122340][ T27] audit: type=1325 audit(1582391800.281:47165): table=nat family=2 entries=5 [ 2139.193866][ T27] audit: type=1325 audit(1582391800.281:47166): table=mangle family=2 entries=6 [ 2139.258875][ T27] audit: type=1325 audit(1582391800.281:47167): table=raw family=2 entries=3 [ 2139.312301][ T27] audit: type=1325 audit(1582391800.281:47168): table=security family=2 entries=4 17:16:40 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2139.532057][ T27] audit: type=1325 audit(1582391800.731:47169): table=filter family=10 entries=4 [ 2139.609649][ T27] audit: type=1325 audit(1582391800.741:47170): table=mangle family=10 entries=6 [ 2139.675094][ T27] audit: type=1325 audit(1582391800.741:47171): table=raw family=10 entries=3 [ 2139.725000][ T27] audit: type=1325 audit(1582391800.741:47172): table=security family=10 entries=4 [ 2139.799812][ T27] audit: type=1325 audit(1582391800.791:47173): table=filter family=10 entries=4 17:16:41 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:41 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:41 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:41 executing program 3: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:41 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:41 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:42 executing program 3: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:42 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:42 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:43 executing program 3: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:43 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:43 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 3: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 3: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:44 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:45 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:45 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2144.100577][ T27] kauditd_printk_skb: 114 callbacks suppressed [ 2144.100584][ T27] audit: type=1325 audit(1582391805.301:47288): table=filter family=10 entries=4 [ 2144.184646][ T27] audit: type=1325 audit(1582391805.311:47289): table=mangle family=10 entries=6 [ 2144.241407][ T27] audit: type=1325 audit(1582391805.311:47290): table=raw family=10 entries=3 [ 2144.290004][ T27] audit: type=1325 audit(1582391805.321:47291): table=security family=10 entries=4 [ 2144.554504][ T27] audit: type=1325 audit(1582391805.741:47292): table=filter family=2 entries=4 [ 2144.593895][ T27] audit: type=1325 audit(1582391805.751:47293): table=nat family=2 entries=5 [ 2144.646868][ T27] audit: type=1325 audit(1582391805.751:47294): table=mangle family=2 entries=6 [ 2144.705821][ T27] audit: type=1325 audit(1582391805.751:47295): table=raw family=2 entries=3 [ 2144.770938][ T27] audit: type=1325 audit(1582391805.761:47296): table=security family=2 entries=4 [ 2144.810134][ T27] audit: type=1325 audit(1582391805.981:47297): table=filter family=10 entries=4 17:16:46 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:46 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:46 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:46 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:46 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:46 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:46 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:46 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) [ 2145.951804][T27000] warn_alloc: 9 callbacks suppressed [ 2145.951818][T27000] syz-executor.5: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz5,mems_allowed=0-1 [ 2146.011759][T27000] CPU: 1 PID: 27000 Comm: syz-executor.5 Not tainted 5.6.0-rc2-syzkaller #0 [ 2146.020437][T27000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2146.030489][T27000] Call Trace: [ 2146.033793][T27000] dump_stack+0x1fb/0x318 [ 2146.038177][T27000] warn_alloc+0x17d/0x2c0 [ 2146.042526][T27000] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2146.048964][T27000] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2146.054663][T27000] ? __next_zones_zonelist+0xb0/0x170 [ 2146.060112][T27000] __alloc_pages_nodemask+0x39a/0x5d0 [ 2146.065512][T27000] alloc_pages_current+0x2db/0x500 [ 2146.070656][T27000] ion_page_pool_alloc+0x4be/0x5e0 [ 2146.075769][T27000] ion_system_heap_allocate+0x210/0xb90 [ 2146.081332][T27000] ion_ioctl+0x45f/0x10a0 [ 2146.085729][T27000] ? debug_shrink_set+0x130/0x130 [ 2146.090784][T27000] __se_sys_ioctl+0x113/0x190 [ 2146.095469][T27000] __x64_sys_ioctl+0x7b/0x90 [ 2146.100087][T27000] do_syscall_64+0xf7/0x1c0 [ 2146.104608][T27000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2146.110493][T27000] RIP: 0033:0x45c429 [ 2146.114376][T27000] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2146.134115][T27000] RSP: 002b:00007f82c90d8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2146.142539][T27000] RAX: ffffffffffffffda RBX: 00007f82c90d96d4 RCX: 000000000045c429 [ 2146.150508][T27000] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 2146.158641][T27000] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2146.166615][T27000] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2146.174601][T27000] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2146.248118][T27000] Mem-Info: [ 2146.252930][T27000] active_anon:178485 inactive_anon:231 isolated_anon:22 [ 2146.252930][T27000] active_file:4798 inactive_file:2091 isolated_file:7 [ 2146.252930][T27000] unevictable:0 dirty:65 writeback:0 unstable:0 [ 2146.252930][T27000] slab_reclaimable:17560 slab_unreclaimable:131824 [ 2146.252930][T27000] mapped:57993 shmem:303 pagetables:3026 bounce:0 [ 2146.252930][T27000] free:972262 free_pcp:509 free_cma:0 17:16:47 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:47 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:47 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:47 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:47 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2146.298156][T27000] Node 0 active_anon:704692kB inactive_anon:912kB active_file:17792kB inactive_file:7680kB unevictable:0kB isolated(anon):88kB isolated(file):28kB mapped:231036kB dirty:260kB writeback:0kB shmem:1200kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 452608kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2146.357728][T27000] Node 0 DMA free:10424kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 17:16:47 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:47 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2146.567344][T27000] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2146.609154][T27000] Node 0 DMA32 free:158572kB min:42420kB low:51488kB high:60556kB reserved_highatomic:2048KB active_anon:709072kB inactive_anon:912kB active_file:18072kB inactive_file:7532kB unevictable:0kB writepending:276kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10608kB pagetables:12144kB bounce:0kB free_pcp:856kB local_pcp:604kB free_cma:0kB 17:16:47 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:47 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2146.790072][T27000] lowmem_reserve[]: 0 0 0 0 0 [ 2146.795101][T27000] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:8kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 17:16:48 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2146.959016][T27000] lowmem_reserve[]: 0 0 0 0 0 [ 2146.995938][T27000] Node 0 DMA: 8*4kB (UE) 5*8kB (UE) 2*16kB (UE) 18*32kB (U) 5*64kB (UE) 2*128kB (UE) 3*256kB (UE) 1*512kB (E) 2*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10728kB [ 2147.090386][T27000] Node 0 DMA32: 387*4kB (UMEH) 79*8kB (UEH) 124*16kB (UMEH) 1378*32kB (UMH) 1007*64kB (UEH) 293*128kB (UMH) 121*256kB (UH) 49*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 206276kB [ 2147.166364][T27000] Node 0 Normal: 2*4kB (U) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 2147.216910][T27000] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2147.262912][T27000] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2147.290285][T27000] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2147.309507][T27000] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2147.349667][T27000] 7120 total pagecache pages [ 2147.393488][T27000] 0 pages in swap cache [ 2147.405945][T27000] Swap cache stats: add 0, delete 0, find 0/0 [ 2147.422789][T27000] Free swap = 0kB [ 2147.429298][T27000] Total swap = 0kB [ 2147.434743][T27000] 1965979 pages RAM [ 2147.448356][T27000] 0 pages HighMem/MovableOnly [ 2147.453926][T27000] 339072 pages reserved [ 2147.458604][T27000] 0 pages cma reserved 17:16:48 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:48 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:48 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:48 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:48 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:49 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:50 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:50 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:50 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:50 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:50 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:50 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2149.320207][ T27] kauditd_printk_skb: 114 callbacks suppressed [ 2149.320215][ T27] audit: type=1325 audit(1582391810.511:47412): table=filter family=2 entries=4 [ 2149.356773][ T27] audit: type=1325 audit(1582391810.511:47413): table=mangle family=2 entries=6 [ 2149.447131][ T27] audit: type=1325 audit(1582391810.511:47414): table=raw family=2 entries=3 [ 2149.526957][ T27] audit: type=1325 audit(1582391810.511:47415): table=security family=2 entries=4 [ 2149.599848][ T27] audit: type=1325 audit(1582391810.511:47416): table=filter family=10 entries=4 [ 2149.656226][ T27] audit: type=1325 audit(1582391810.511:47417): table=mangle family=10 entries=6 [ 2149.713998][ T27] audit: type=1325 audit(1582391810.511:47418): table=raw family=10 entries=3 [ 2149.774583][ T27] audit: type=1325 audit(1582391810.511:47419): table=security family=10 entries=4 [ 2149.876115][ T27] audit: type=1325 audit(1582391810.551:47420): table=filter family=2 entries=4 [ 2149.921291][ T27] audit: type=1325 audit(1582391810.551:47421): table=mangle family=2 entries=6 17:16:51 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:51 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:51 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:51 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:51 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:52 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:52 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:52 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:52 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:52 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:52 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:52 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:52 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:52 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:53 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:53 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:53 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:53 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:53 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:53 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:16:54 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:54 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:54 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:54 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:54 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:54 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:54 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:54 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:16:54 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:54 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:54 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) [ 2154.755587][ T27] kauditd_printk_skb: 165 callbacks suppressed [ 2154.755595][ T27] audit: type=1325 audit(1582391815.951:47587): table=filter family=10 entries=4 [ 2154.798234][ T27] audit: type=1325 audit(1582391815.971:47588): table=mangle family=10 entries=6 [ 2154.825117][ T27] audit: type=1325 audit(1582391815.971:47589): table=raw family=10 entries=3 [ 2154.848631][ T27] audit: type=1325 audit(1582391815.971:47590): table=security family=10 entries=4 17:16:56 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:56 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:16:56 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:56 executing program 5: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:56 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:56 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2155.182258][ T27] audit: type=1325 audit(1582391816.381:47591): table=filter family=2 entries=4 [ 2155.220830][ T27] audit: type=1325 audit(1582391816.391:47592): table=nat family=2 entries=5 [ 2155.229700][ T27] audit: type=1325 audit(1582391816.391:47593): table=mangle family=2 entries=6 17:16:56 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) [ 2155.318114][ T27] audit: type=1325 audit(1582391816.391:47594): table=raw family=2 entries=3 [ 2155.390260][ T27] audit: type=1325 audit(1582391816.391:47595): table=security family=2 entries=4 [ 2155.399694][ T27] audit: type=1325 audit(1582391816.411:47596): table=filter family=10 entries=4 17:16:56 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:57 executing program 1: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:57 executing program 5: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:57 executing program 1: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:57 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:57 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:57 executing program 5: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:57 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:58 executing program 1: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:58 executing program 5: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2157.338276][T27201] warn_alloc: 9 callbacks suppressed [ 2157.338291][T27201] syz-executor.3: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz3,mems_allowed=0-1 [ 2157.470087][T27201] CPU: 0 PID: 27201 Comm: syz-executor.3 Not tainted 5.6.0-rc2-syzkaller #0 [ 2157.478820][T27201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2157.488879][T27201] Call Trace: [ 2157.492176][T27201] dump_stack+0x1fb/0x318 [ 2157.496527][T27201] warn_alloc+0x17d/0x2c0 [ 2157.500865][T27201] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2157.507290][T27201] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2157.512869][T27201] ? __next_zones_zonelist+0xb0/0x170 [ 2157.518271][T27201] __alloc_pages_nodemask+0x39a/0x5d0 [ 2157.523668][T27201] alloc_pages_current+0x2db/0x500 [ 2157.528851][T27201] ion_page_pool_alloc+0x4be/0x5e0 [ 2157.533983][T27201] ion_system_heap_allocate+0x210/0xb90 [ 2157.539550][T27201] ion_ioctl+0x45f/0x10a0 [ 2157.543911][T27201] ? debug_shrink_set+0x130/0x130 [ 2157.548961][T27201] __se_sys_ioctl+0x113/0x190 [ 2157.553655][T27201] __x64_sys_ioctl+0x7b/0x90 [ 2157.558254][T27201] do_syscall_64+0xf7/0x1c0 [ 2157.562768][T27201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2157.568684][T27201] RIP: 0033:0x45c429 [ 2157.572585][T27201] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2157.592204][T27201] RSP: 002b:00007fe72e922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2157.600615][T27201] RAX: ffffffffffffffda RBX: 00007fe72e9236d4 RCX: 000000000045c429 [ 2157.608712][T27201] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 2157.616704][T27201] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2157.624700][T27201] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2157.632670][T27201] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2157.820371][T27201] Mem-Info: [ 2157.823648][T27201] active_anon:178580 inactive_anon:231 isolated_anon:0 [ 2157.823648][T27201] active_file:4108 inactive_file:595 isolated_file:0 [ 2157.823648][T27201] unevictable:0 dirty:58 writeback:0 unstable:0 [ 2157.823648][T27201] slab_reclaimable:17609 slab_unreclaimable:131354 [ 2157.823648][T27201] mapped:55395 shmem:303 pagetables:3128 bounce:0 [ 2157.823648][T27201] free:876846 free_pcp:384 free_cma:0 [ 2158.004475][T27201] Node 0 active_anon:705012kB inactive_anon:924kB active_file:14208kB inactive_file:2012kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220440kB dirty:200kB writeback:0kB shmem:1212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 448512kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2158.123836][T27201] Node 0 DMA free:10556kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:72kB inactive_anon:0kB active_file:224kB inactive_file:268kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 17:16:59 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2158.207172][T27201] lowmem_reserve[]: 0 2557 2557 2557 2557 17:16:59 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:59 executing program 1: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:59 executing program 5: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2158.227778][T27201] Node 0 DMA32 free:234472kB min:36276kB low:45344kB high:54412kB reserved_highatomic:2048KB active_anon:702868kB inactive_anon:924kB active_file:13704kB inactive_file:2172kB unevictable:0kB writepending:180kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10448kB pagetables:12020kB bounce:0kB free_pcp:1332kB local_pcp:268kB free_cma:0kB 17:16:59 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:16:59 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2158.430383][T27201] lowmem_reserve[]: 0 0 0 0 0 17:16:59 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2158.507429][T27201] Node 0 Normal free:8kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 17:16:59 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2158.630267][T27201] lowmem_reserve[]: 0 0 0 0 0 [ 2158.635178][T27201] Node 0 DMA: 5*4kB (UM) 15*8kB (UME) 9*16kB (UM) 1*32kB (U) 7*64kB (UME) 4*128kB (UME) 4*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 2*2048kB (UE) 0*4096kB = 10492kB 17:16:59 executing program 5: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2158.799998][T27201] Node 0 DMA32: 195*4kB (EH) 618*8kB (UEH) 2448*16kB (UEH) 1471*32kB (UH) 454*64kB (UH) 225*128kB (UH) 70*256kB (UH) 16*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 175932kB [ 2158.882259][T27201] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2158.943469][T27201] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2158.986059][T27201] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2159.027955][T27201] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2159.084863][T27201] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2159.130579][T27201] 5259 total pagecache pages [ 2159.135225][T27201] 0 pages in swap cache [ 2159.139402][T27201] Swap cache stats: add 0, delete 0, find 0/0 [ 2159.225810][T27201] Free swap = 0kB [ 2159.248307][T27201] Total swap = 0kB [ 2159.274960][T27201] 1965979 pages RAM [ 2159.294246][T27201] 0 pages HighMem/MovableOnly [ 2159.347385][T27201] 339072 pages reserved [ 2159.390265][T27201] 0 pages cma reserved [ 2160.085119][ T27] kauditd_printk_skb: 91 callbacks suppressed [ 2160.085127][ T27] audit: type=1325 audit(1582391821.281:47688): table=filter family=2 entries=4 [ 2160.152843][ T27] audit: type=1325 audit(1582391821.321:47689): table=nat family=2 entries=5 [ 2160.176781][ T27] audit: type=1325 audit(1582391821.321:47690): table=mangle family=2 entries=6 [ 2160.216081][ T27] audit: type=1325 audit(1582391821.321:47691): table=raw family=2 entries=3 [ 2160.280110][ T27] audit: type=1325 audit(1582391821.321:47692): table=security family=2 entries=4 [ 2160.289442][ T27] audit: type=1325 audit(1582391821.321:47693): table=filter family=10 entries=4 [ 2160.310254][ T27] audit: type=1325 audit(1582391821.321:47694): table=mangle family=10 entries=6 [ 2160.319390][ T27] audit: type=1325 audit(1582391821.321:47695): table=raw family=10 entries=3 [ 2160.363024][ T27] audit: type=1325 audit(1582391821.321:47696): table=security family=10 entries=4 [ 2160.396138][ T27] audit: type=1325 audit(1582391821.511:47697): table=filter family=2 entries=4 17:17:01 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:01 executing program 1: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:01 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:01 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:01 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:01 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:01 executing program 1: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:01 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:02 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:02 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:02 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:02 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:02 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:03 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:03 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:03 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:03 executing program 0: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:04 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 0: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 0: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2165.309980][ T27] kauditd_printk_skb: 95 callbacks suppressed [ 2165.309988][ T27] audit: type=1325 audit(1582391826.501:47793): table=filter family=10 entries=4 [ 2165.423392][ T27] audit: type=1325 audit(1582391826.501:47794): table=mangle family=10 entries=6 17:17:06 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 4: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:06 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2165.498043][ T27] audit: type=1325 audit(1582391826.501:47795): table=raw family=10 entries=3 [ 2165.570404][ T27] audit: type=1325 audit(1582391826.501:47796): table=security family=10 entries=4 [ 2165.635041][ T27] audit: type=1325 audit(1582391826.501:47797): table=filter family=3 entries=4 [ 2165.713499][ T27] audit: type=1325 audit(1582391826.501:47798): table=filter family=2 entries=4 17:17:07 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2165.779383][ T27] audit: type=1325 audit(1582391826.501:47799): table=mangle family=2 entries=6 [ 2165.842989][ T27] audit: type=1325 audit(1582391826.501:47800): table=raw family=2 entries=3 [ 2165.916978][ T27] audit: type=1325 audit(1582391826.501:47801): table=security family=2 entries=4 [ 2165.967846][ T27] audit: type=1325 audit(1582391826.521:47802): table=filter family=3 entries=4 17:17:07 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:07 executing program 0: set_mempolicy(0x2, 0x0, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:07 executing program 2: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:07 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:07 executing program 4: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:07 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:07 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:07 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:08 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:08 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:08 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:08 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:08 executing program 4: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 0: set_mempolicy(0x2, 0x0, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:11 executing program 4: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 2: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 2: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:11 executing program 4: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2170.329282][ T27] kauditd_printk_skb: 109 callbacks suppressed [ 2170.329289][ T27] audit: type=1325 audit(1582391831.521:47912): table=filter family=2 entries=4 17:17:11 executing program 0: set_mempolicy(0x2, 0x0, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2170.430429][ T27] audit: type=1325 audit(1582391831.541:47913): table=nat family=2 entries=5 [ 2170.439217][ T27] audit: type=1325 audit(1582391831.541:47914): table=mangle family=2 entries=6 17:17:11 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:11 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:11 executing program 4: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2170.551642][ T27] audit: type=1325 audit(1582391831.571:47915): table=raw family=2 entries=3 [ 2170.619828][ T27] audit: type=1325 audit(1582391831.571:47916): table=filter family=2 entries=4 17:17:11 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2170.684247][ T27] audit: type=1325 audit(1582391831.571:47917): table=mangle family=2 entries=6 17:17:11 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2170.749024][ T27] audit: type=1325 audit(1582391831.571:47918): table=raw family=2 entries=3 17:17:12 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) [ 2170.806702][ T27] audit: type=1325 audit(1582391831.571:47919): table=security family=2 entries=4 [ 2170.880060][ T27] audit: type=1325 audit(1582391831.571:47920): table=filter family=10 entries=4 17:17:12 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2170.930012][ T27] audit: type=1325 audit(1582391831.571:47921): table=mangle family=10 entries=6 17:17:12 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:12 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:12 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:12 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:12 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:12 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:12 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:12 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:12 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:12 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:12 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:13 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:13 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:13 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:13 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:15 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:15 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:15 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:15 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:15 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:15 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:16 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:16 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:16 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:16 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:16 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) [ 2175.377739][ T27] kauditd_printk_skb: 123 callbacks suppressed [ 2175.377746][ T27] audit: type=1325 audit(1582391836.571:48045): table=filter family=2 entries=4 [ 2175.428257][ T27] audit: type=1325 audit(1582391836.571:48046): table=nat family=2 entries=5 [ 2175.470219][ T27] audit: type=1325 audit(1582391836.571:48047): table=mangle family=2 entries=6 [ 2175.507799][ T27] audit: type=1325 audit(1582391836.571:48048): table=raw family=2 entries=3 [ 2175.517064][ T27] audit: type=1325 audit(1582391836.571:48049): table=security family=2 entries=4 17:17:17 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:17 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:17 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:17 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:17 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:17 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2176.336699][ T27] audit: type=1325 audit(1582391837.531:48050): table=filter family=3 entries=4 [ 2176.370037][ T27] audit: type=1325 audit(1582391837.531:48051): table=filter family=2 entries=4 17:17:17 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) [ 2176.379112][ T27] audit: type=1325 audit(1582391837.531:48052): table=mangle family=2 entries=6 17:17:17 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:17 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2176.460372][ T27] audit: type=1325 audit(1582391837.531:48053): table=raw family=2 entries=3 [ 2176.517603][ T27] audit: type=1325 audit(1582391837.531:48054): table=security family=2 entries=4 17:17:17 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:17 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:18 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:18 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:18 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:18 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:18 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:19 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:19 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:19 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:19 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:19 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:20 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:20 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:20 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:20 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:20 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:20 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:20 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:20 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:20 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:21 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:21 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) [ 2180.463981][ T27] kauditd_printk_skb: 146 callbacks suppressed [ 2180.463989][ T27] audit: type=1325 audit(1582391841.661:48201): table=filter family=2 entries=4 [ 2180.487618][ T27] audit: type=1325 audit(1582391841.681:48202): table=nat family=2 entries=5 [ 2180.547501][ T27] audit: type=1325 audit(1582391841.681:48203): table=mangle family=2 entries=6 [ 2180.620421][ T27] audit: type=1325 audit(1582391841.681:48204): table=raw family=2 entries=3 [ 2180.629220][ T27] audit: type=1325 audit(1582391841.681:48205): table=security family=2 entries=4 [ 2180.781539][ T27] audit: type=1325 audit(1582391841.911:48206): table=filter family=10 entries=4 [ 2180.830240][ T27] audit: type=1325 audit(1582391841.911:48207): table=mangle family=10 entries=6 [ 2180.839513][ T27] audit: type=1325 audit(1582391841.911:48208): table=raw family=10 entries=3 [ 2180.922188][ T27] audit: type=1325 audit(1582391841.911:48209): table=security family=10 entries=4 [ 2180.958371][ T27] audit: type=1325 audit(1582391841.991:48210): table=filter family=2 entries=4 17:17:22 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:22 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:22 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:22 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:22 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:22 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:22 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:23 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:23 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:23 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:23 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:23 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:23 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:24 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:24 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:24 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:24 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:24 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:24 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:24 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:24 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:24 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:24 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:24 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:24 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:25 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:25 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:25 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:25 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:25 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:25 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:25 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:25 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:25 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:25 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2184.524748][T27703] warn_alloc: 3 callbacks suppressed [ 2184.524764][T27703] syz-executor.5: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz5,mems_allowed=0-1 [ 2184.600250][T27703] CPU: 0 PID: 27703 Comm: syz-executor.5 Not tainted 5.6.0-rc2-syzkaller #0 [ 2184.608999][T27703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2184.619091][T27703] Call Trace: [ 2184.622380][T27703] dump_stack+0x1fb/0x318 [ 2184.626717][T27703] warn_alloc+0x17d/0x2c0 [ 2184.631072][T27703] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2184.637528][T27703] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2184.643122][T27703] ? __next_zones_zonelist+0xb0/0x170 [ 2184.648573][T27703] __alloc_pages_nodemask+0x39a/0x5d0 [ 2184.654097][T27703] alloc_pages_current+0x2db/0x500 [ 2184.659227][T27703] ion_page_pool_alloc+0x4be/0x5e0 [ 2184.664345][T27703] ion_system_heap_allocate+0x210/0xb90 [ 2184.669973][T27703] ion_ioctl+0x45f/0x10a0 [ 2184.674351][T27703] ? debug_shrink_set+0x130/0x130 [ 2184.679396][T27703] __se_sys_ioctl+0x113/0x190 [ 2184.684086][T27703] __x64_sys_ioctl+0x7b/0x90 [ 2184.688701][T27703] do_syscall_64+0xf7/0x1c0 [ 2184.693210][T27703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2184.699114][T27703] RIP: 0033:0x45c429 [ 2184.703034][T27703] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2184.722631][T27703] RSP: 002b:00007f82c90d8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2184.731052][T27703] RAX: ffffffffffffffda RBX: 00007f82c90d96d4 RCX: 000000000045c429 [ 2184.739022][T27703] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 2184.747003][T27703] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2184.754986][T27703] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2184.762955][T27703] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c 17:17:26 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:26 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) [ 2184.955489][T27703] Mem-Info: [ 2184.969317][T27703] active_anon:178477 inactive_anon:231 isolated_anon:0 [ 2184.969317][T27703] active_file:4563 inactive_file:1260 isolated_file:0 [ 2184.969317][T27703] unevictable:0 dirty:94 writeback:0 unstable:0 [ 2184.969317][T27703] slab_reclaimable:18219 slab_unreclaimable:131973 [ 2184.969317][T27703] mapped:56054 shmem:303 pagetables:3039 bounce:0 [ 2184.969317][T27703] free:985618 free_pcp:428 free_cma:0 [ 2185.135562][T27703] Node 0 active_anon:704840kB inactive_anon:924kB active_file:15716kB inactive_file:4284kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222632kB dirty:328kB writeback:0kB shmem:1212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 450560kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2185.166174][T27703] Node 0 DMA free:11476kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:468kB inactive_file:624kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2185.195944][T27703] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2185.201977][T27703] Node 0 DMA32 free:380504kB min:44468kB low:53536kB high:62604kB reserved_highatomic:2048KB active_anon:704840kB inactive_anon:924kB active_file:15244kB inactive_file:3660kB unevictable:0kB writepending:324kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10396kB pagetables:11748kB bounce:0kB free_pcp:1280kB local_pcp:1040kB free_cma:0kB [ 2185.236899][T27703] lowmem_reserve[]: 0 0 0 0 0 [ 2185.241914][T27703] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:8kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2185.271577][T27703] lowmem_reserve[]: 0 0 0 0 0 [ 2185.276428][T27703] Node 0 DMA: 37*4kB (UME) 48*8kB (UME) 27*16kB (UME) 21*32kB (UM) 16*64kB (UE) 17*128kB (UE) 4*256kB (UE) 3*512kB (UME) 2*1024kB (UE) 1*2048kB (E) 0*4096kB = 11492kB [ 2185.294620][T27703] Node 0 DMA32: 658*4kB (UMEH) 144*8kB (UMEH) 2558*16kB (UMH) 1593*32kB (UMH) 1477*64kB (UH) 448*128kB (UH) 175*256kB (UH) 45*512kB (U) 56*1024kB (U) 4*2048kB (UM) 0*4096kB = 380936kB [ 2185.313471][T27703] Node 0 Normal: 4*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 24kB [ 2185.326113][T27703] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2185.336496][T27703] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2185.347119][T27703] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2185.357275][T27703] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2185.366943][T27703] 6009 total pagecache pages [ 2185.372015][T27703] 0 pages in swap cache [ 2185.376539][T27703] Swap cache stats: add 0, delete 0, find 0/0 [ 2185.383008][T27703] Free swap = 0kB [ 2185.386956][T27703] Total swap = 0kB [ 2185.391208][T27703] 1965979 pages RAM [ 2185.395309][T27703] 0 pages HighMem/MovableOnly [ 2185.400363][T27703] 339072 pages reserved [ 2185.404609][T27703] 0 pages cma reserved 17:17:26 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:26 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:26 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:26 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:26 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:26 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2185.738342][ T27] kauditd_printk_skb: 154 callbacks suppressed [ 2185.738350][ T27] audit: type=1325 audit(1582391846.931:48365): table=filter family=2 entries=4 17:17:27 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:27 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2185.841860][ T27] audit: type=1325 audit(1582391846.931:48366): table=mangle family=2 entries=6 [ 2185.901434][ T27] audit: type=1325 audit(1582391846.931:48367): table=raw family=2 entries=3 [ 2185.991244][ T27] audit: type=1325 audit(1582391846.931:48368): table=security family=2 entries=4 [ 2186.050249][ T27] audit: type=1325 audit(1582391846.941:48369): table=filter family=10 entries=4 [ 2186.094693][ T27] audit: type=1325 audit(1582391846.941:48370): table=mangle family=10 entries=6 [ 2186.155497][ T27] audit: type=1325 audit(1582391846.941:48371): table=raw family=10 entries=3 [ 2186.211515][ T27] audit: type=1325 audit(1582391846.941:48372): table=security family=10 entries=4 [ 2186.240868][ T27] audit: type=1325 audit(1582391847.061:48373): table=filter family=3 entries=4 [ 2186.288486][ T27] audit: type=1325 audit(1582391847.061:48374): table=filter family=10 entries=4 17:17:27 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:28 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:28 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:28 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:28 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:28 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:29 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:29 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:29 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:30 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:30 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:30 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:30 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:31 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:31 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:31 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:31 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:31 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2190.772603][ T27] kauditd_printk_skb: 91 callbacks suppressed [ 2190.772610][ T27] audit: type=1325 audit(1582391851.971:48466): table=filter family=10 entries=4 [ 2190.847216][ T27] audit: type=1325 audit(1582391851.991:48467): table=mangle family=10 entries=6 [ 2190.945094][ T27] audit: type=1325 audit(1582391851.991:48468): table=raw family=10 entries=3 [ 2191.003533][ T27] audit: type=1325 audit(1582391851.991:48469): table=security family=10 entries=4 [ 2191.061203][ T27] audit: type=1325 audit(1582391852.101:48470): table=filter family=2 entries=4 17:17:32 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:32 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:32 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:32 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:32 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2191.150190][ T27] audit: type=1325 audit(1582391852.101:48471): table=mangle family=2 entries=6 [ 2191.159495][ T27] audit: type=1325 audit(1582391852.101:48472): table=raw family=2 entries=3 [ 2191.294715][ T27] audit: type=1325 audit(1582391852.101:48473): table=security family=2 entries=4 [ 2191.336807][ T27] audit: type=1325 audit(1582391852.101:48474): table=security family=10 entries=4 [ 2191.440010][ T27] audit: type=1325 audit(1582391852.121:48475): table=filter family=10 entries=4 17:17:32 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:33 executing program 3: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:33 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:33 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:33 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:33 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:33 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:34 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:34 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:34 executing program 3: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:34 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:35 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:35 executing program 2: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:35 executing program 3: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:35 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:36 executing program 2: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:36 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:36 executing program 3: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:36 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:36 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:36 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:36 executing program 2: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:36 executing program 3: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:37 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:37 executing program 3: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:37 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2196.366209][ T27] kauditd_printk_skb: 119 callbacks suppressed [ 2196.366217][ T27] audit: type=1325 audit(1582391857.561:48595): table=filter family=3 entries=4 [ 2196.510372][ T27] audit: type=1325 audit(1582391857.621:48596): table=filter family=2 entries=4 [ 2196.562412][ T27] audit: type=1325 audit(1582391857.621:48597): table=filter family=2 entries=4 [ 2196.624915][ T27] audit: type=1325 audit(1582391857.621:48598): table=nat family=2 entries=5 [ 2196.675928][ T27] audit: type=1325 audit(1582391857.621:48599): table=mangle family=2 entries=6 [ 2196.730376][ T27] audit: type=1325 audit(1582391857.651:48600): table=mangle family=2 entries=6 [ 2196.777572][ T27] audit: type=1325 audit(1582391857.651:48601): table=raw family=2 entries=3 [ 2196.834754][ T27] audit: type=1325 audit(1582391857.651:48602): table=security family=2 entries=4 [ 2196.881375][ T27] audit: type=1325 audit(1582391857.651:48603): table=raw family=2 entries=3 17:17:38 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2196.928016][ T27] audit: type=1325 audit(1582391857.651:48604): table=security family=2 entries=4 17:17:38 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:38 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:38 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:38 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2197.590703][T27898] warn_alloc: 18 callbacks suppressed [ 2197.590720][T27898] syz-executor.0: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz0,mems_allowed=0-1 [ 2197.650359][T27898] CPU: 0 PID: 27898 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 2197.659112][T27898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2197.669205][T27898] Call Trace: [ 2197.672506][T27898] dump_stack+0x1fb/0x318 [ 2197.676849][T27898] warn_alloc+0x17d/0x2c0 [ 2197.681178][T27898] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2197.687607][T27898] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2197.693251][T27898] ? __next_zones_zonelist+0xb0/0x170 [ 2197.698682][T27898] __alloc_pages_nodemask+0x39a/0x5d0 [ 2197.704088][T27898] alloc_pages_current+0x2db/0x500 [ 2197.709285][T27898] ion_page_pool_alloc+0x4be/0x5e0 [ 2197.714426][T27898] ion_system_heap_allocate+0x210/0xb90 [ 2197.719987][T27898] ion_ioctl+0x45f/0x10a0 [ 2197.724348][T27898] ? debug_shrink_set+0x130/0x130 [ 2197.729368][T27898] __se_sys_ioctl+0x113/0x190 [ 2197.734068][T27898] __x64_sys_ioctl+0x7b/0x90 [ 2197.738707][T27898] do_syscall_64+0xf7/0x1c0 [ 2197.743250][T27898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2197.749132][T27898] RIP: 0033:0x45c429 [ 2197.753013][T27898] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2197.772611][T27898] RSP: 002b:00007f5029792c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2197.781015][T27898] RAX: ffffffffffffffda RBX: 00007f50297936d4 RCX: 000000000045c429 [ 2197.789031][T27898] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 2197.796999][T27898] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2197.804969][T27898] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2197.812953][T27898] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2198.040160][T27898] Mem-Info: [ 2198.050152][T27898] active_anon:174072 inactive_anon:231 isolated_anon:0 [ 2198.050152][T27898] active_file:4815 inactive_file:7515 isolated_file:0 [ 2198.050152][T27898] unevictable:0 dirty:79 writeback:0 unstable:0 [ 2198.050152][T27898] slab_reclaimable:17639 slab_unreclaimable:131290 [ 2198.050152][T27898] mapped:59068 shmem:303 pagetables:3142 bounce:0 [ 2198.050152][T27898] free:707623 free_pcp:403 free_cma:0 17:17:39 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:39 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:39 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:39 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:39 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000080)="010000000000000000040000075a940000001000008001832f") 17:17:39 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="010000000000000000040000075a9400ffffff8c008001832f") [ 2198.463038][T27898] Node 0 active_anon:685708kB inactive_anon:924kB active_file:16616kB inactive_file:30884kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234384kB dirty:276kB writeback:0kB shmem:1212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 446464kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2198.580066][T27898] Node 0 DMA free:10844kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:848kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 17:17:39 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xc74c99b74075f1e1, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080)=0x8, 0x4) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000040)={0x3, 0x103, 0x2, {0x9, 0x8, 0x3, 0xc69bb8f}}) getpid() r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000001c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'veth0_to_hsr\x00', @remote}) getsockname(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) r5 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f0000000040)={0x0, 0x2b, 0x0, 0xffffffffffffffff}) r7 = dup(r6) r8 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r9 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r9, 0xc0184900, &(0x7f0000000040)={0x5, 0x2b, 0x0, 0xffffffffffffffff}) r11 = dup(r10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r8, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r11}) ioctl$VIDIOC_QBUF(r7, 0xc058560f, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, 0x0) socket(0x0, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) 17:17:40 executing program 2: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2198.871651][T27898] lowmem_reserve[]: 0 2557 2557 2557 2557 17:17:40 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2198.954499][T27898] Node 0 DMA32 free:179136kB min:60852kB low:69920kB high:78988kB reserved_highatomic:2048KB active_anon:683888kB inactive_anon:916kB active_file:16476kB inactive_file:31800kB unevictable:0kB writepending:300kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10676kB pagetables:12240kB bounce:0kB free_pcp:836kB local_pcp:348kB free_cma:0kB [ 2199.257512][T27898] lowmem_reserve[]: 0 0 0 0 0 [ 2199.291917][T27898] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2199.330111][T27898] lowmem_reserve[]: 0 0 0 0 0 [ 2199.335306][T27898] Node 0 DMA: 29*4kB (UME) 11*8kB (UME) 21*16kB (UME) 20*32kB (UM) 7*64kB (UME) 9*128kB (UME) 2*256kB (UE) 6*512kB (UME) 2*1024kB (UE) 1*2048kB (E) 0*4096kB = 10460kB [ 2199.420990][T27898] Node 0 DMA32: 394*4kB (EH) 3010*8kB (UMEH) 3238*16kB (UMEH) 1487*32kB (UMH) 1951*64kB (UMH) 410*128kB (UH) 101*256kB (UH) 11*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 333880kB [ 2199.524991][T27898] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2199.640230][T27898] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2199.689471][T27898] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2199.754195][T27898] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2199.806476][T27898] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2199.840568][T27898] 8726 total pagecache pages [ 2199.857662][T27898] 0 pages in swap cache [ 2199.874367][T27898] Swap cache stats: add 0, delete 0, find 0/0 [ 2199.882606][T27898] Free swap = 0kB [ 2199.886725][T27898] Total swap = 0kB [ 2199.891503][T27898] 1965979 pages RAM [ 2199.895699][T27898] 0 pages HighMem/MovableOnly [ 2199.900818][T27898] 339072 pages reserved [ 2199.905454][T27898] 0 pages cma reserved 17:17:41 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:41 executing program 2: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:41 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xc74c99b74075f1e1, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080)=0x8, 0x4) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000040)={0x3, 0x103, 0x2, {0x9, 0x8, 0x3, 0xc69bb8f}}) getpid() r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000001c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'veth0_to_hsr\x00', @remote}) getsockname(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) r5 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f0000000040)={0x0, 0x2b, 0x0, 0xffffffffffffffff}) r7 = dup(r6) r8 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r9 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r9, 0xc0184900, &(0x7f0000000040)={0x5, 0x2b, 0x0, 0xffffffffffffffff}) r11 = dup(r10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r8, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r11}) ioctl$VIDIOC_QBUF(r7, 0xc058560f, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, 0x0) socket(0x0, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) 17:17:43 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r7, r6, &(0x7f0000000080)=0xf0, 0x100001) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x5}]}, 0x3c}}, 0x0) ioctl$sock_SIOCDELDLCI(r8, 0x8981, &(0x7f0000000100)={'netdevsim0\x00', 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e677c65000000000000000000000000000000000000000000000000000003000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000004fbfdf213701b6bd530c8638cd844048a828f7e618de481d6e6fdbd10714e4789e038921facb22e485c17c8c5745245ba59ea8a5569579007669f43f63c26cf1fd0a168ad1b0c7c016df043fe47bed16a3e7ad03109722e203466e8b9d12c74ae9775f1677cf3099d002a06acca56e13cc8016fcf6aa4b47b315706e58afd751b51bbca6f38bd3e1f75d1eff8eb6bd368adf0d0a"], 0x58) 17:17:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:43 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:43 executing program 2: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:43 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:43 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r7, r6, &(0x7f0000000080)=0xf0, 0x100001) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x5}]}, 0x3c}}, 0x0) ioctl$sock_SIOCDELDLCI(r8, 0x8981, &(0x7f0000000100)={'netdevsim0\x00', 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e677c65000000000000000000000000000000000000000000000000000003000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000004fbfdf213701b6bd530c8638cd844048a828f7e618de481d6e6fdbd10714e4789e038921facb22e485c17c8c5745245ba59ea8a5569579007669f43f63c26cf1fd0a168ad1b0c7c016df043fe47bed16a3e7ad03109722e203466e8b9d12c74ae9775f1677cf3099d002a06acca56e13cc8016fcf6aa4b47b315706e58afd751b51bbca6f38bd3e1f75d1eff8eb6bd368adf0d0a"], 0x58) [ 2201.840532][ T27] kauditd_printk_skb: 105 callbacks suppressed [ 2201.840539][ T27] audit: type=1325 audit(1582391863.041:48710): table=filter family=2 entries=4 17:17:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:43 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:43 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:43 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2201.937745][ T27] audit: type=1325 audit(1582391863.051:48711): table=mangle family=2 entries=6 [ 2201.975855][ T27] audit: type=1325 audit(1582391863.051:48712): table=raw family=2 entries=3 [ 2202.040770][ T27] audit: type=1325 audit(1582391863.061:48713): table=security family=2 entries=4 [ 2202.133384][ T27] audit: type=1325 audit(1582391863.061:48714): table=filter family=10 entries=4 17:17:43 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="010000000000000000040000075a940032050000008001832f") 17:17:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2202.183656][ T27] audit: type=1325 audit(1582391863.061:48715): table=mangle family=10 entries=6 17:17:43 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r7, r6, &(0x7f0000000080)=0xf0, 0x100001) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x5}]}, 0x3c}}, 0x0) ioctl$sock_SIOCDELDLCI(r8, 0x8981, &(0x7f0000000100)={'netdevsim0\x00', 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e677c65000000000000000000000000000000000000000000000000000003000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000004fbfdf213701b6bd530c8638cd844048a828f7e618de481d6e6fdbd10714e4789e038921facb22e485c17c8c5745245ba59ea8a5569579007669f43f63c26cf1fd0a168ad1b0c7c016df043fe47bed16a3e7ad03109722e203466e8b9d12c74ae9775f1677cf3099d002a06acca56e13cc8016fcf6aa4b47b315706e58afd751b51bbca6f38bd3e1f75d1eff8eb6bd368adf0d0a"], 0x58) [ 2202.235240][ T27] audit: type=1325 audit(1582391863.061:48716): table=raw family=10 entries=3 [ 2202.304199][ T27] audit: type=1325 audit(1582391863.061:48717): table=security family=10 entries=4 [ 2202.365531][ T27] audit: type=1325 audit(1582391863.191:48718): table=filter family=2 entries=4 17:17:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:43 executing program 5 (fault-call:2 fault-nth:0): set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2202.415914][ T27] audit: type=1325 audit(1582391863.211:48719): table=nat family=2 entries=5 17:17:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:43 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r7, r6, &(0x7f0000000080)=0xf0, 0x100001) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x5}]}, 0x3c}}, 0x0) ioctl$sock_SIOCDELDLCI(r8, 0x8981, &(0x7f0000000100)={'netdevsim0\x00', 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e677c65000000000000000000000000000000000000000000000000000003000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000004fbfdf213701b6bd530c8638cd844048a828f7e618de481d6e6fdbd10714e4789e038921facb22e485c17c8c5745245ba59ea8a5569579007669f43f63c26cf1fd0a168ad1b0c7c016df043fe47bed16a3e7ad03109722e203466e8b9d12c74ae9775f1677cf3099d002a06acca56e13cc8016fcf6aa4b47b315706e58afd751b51bbca6f38bd3e1f75d1eff8eb6bd368adf0d0a"], 0x58) 17:17:43 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:43 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:43 executing program 0: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:43 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:44 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r7, r6, &(0x7f0000000080)=0xf0, 0x100001) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x5}]}, 0x3c}}, 0x0) ioctl$sock_SIOCDELDLCI(r8, 0x8981, &(0x7f0000000100)={'netdevsim0\x00', 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 17:17:44 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x2, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:44 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:44 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r6, r5, &(0x7f0000000080)=0xf0, 0x100001) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x5}]}, 0x3c}}, 0x0) ioctl$sock_SIOCDELDLCI(r7, 0x8981, &(0x7f0000000100)={'netdevsim0\x00', 0x9}) 17:17:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x10, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:44 executing program 0: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:44 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:44 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4b66, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:44 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:44 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4c00, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:45 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r6, r5, &(0x7f0000000080)=0xf0, 0x100001) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x5}]}, 0x3c}}, 0x0) 17:17:45 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:45 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4c01, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:45 executing program 0: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:45 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:45 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:45 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x541b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:45 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r6, r5, &(0x7f0000000080)=0xf0, 0x100001) socket$nl_route(0x10, 0x3, 0x0) 17:17:45 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5421, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:45 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:45 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:45 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5450, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:45 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r6, r5, &(0x7f0000000080)=0xf0, 0x100001) 17:17:45 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:46 executing program 0: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:46 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5451, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:46 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:46 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r6 = socket$inet6(0xa, 0x2, 0x0) sendfile(r6, r5, &(0x7f0000000080)=0xf0, 0x100001) 17:17:46 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:46 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5452, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:46 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:46 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r6 = socket$inet6(0xa, 0x2, 0x0) sendfile(r6, r5, &(0x7f0000000080)=0xf0, 0x100001) 17:17:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5460, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, 0x0, 0x0) 17:17:47 executing program 0: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:47 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, 0x0, 0x0) 17:17:47 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x6364, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:47 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r6 = socket$inet6(0xa, 0x2, 0x0) sendfile(r6, r5, &(0x7f0000000080)=0xf0, 0x100001) 17:17:47 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, 0x0, 0x0) 17:17:47 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:47 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8912, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:47 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r5, &(0x7f0000000080)=0xf0, 0x100001) 17:17:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 17:17:47 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8918, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 17:17:48 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r5, &(0x7f0000000080)=0xf0, 0x100001) 17:17:48 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:48 executing program 0: set_mempolicy(0x2, 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:48 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8933, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2206.879850][ T27] kauditd_printk_skb: 189 callbacks suppressed [ 2206.879858][ T27] audit: type=1325 audit(1582391868.071:48909): table=filter family=2 entries=4 [ 2206.952071][ T27] audit: type=1325 audit(1582391868.091:48910): table=nat family=2 entries=5 [ 2207.037023][ T27] audit: type=1325 audit(1582391868.091:48911): table=mangle family=2 entries=6 17:17:48 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 17:17:48 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:48 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40045402, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:48 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r5, &(0x7f0000000080)=0xf0, 0x100001) [ 2207.115958][ T27] audit: type=1325 audit(1582391868.091:48912): table=raw family=2 entries=3 [ 2207.180075][ T27] audit: type=1325 audit(1582391868.091:48913): table=security family=2 entries=4 [ 2207.189353][ T27] audit: type=1325 audit(1582391868.091:48914): table=filter family=10 entries=4 17:17:48 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:17:48 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2207.384751][ T27] audit: type=1325 audit(1582391868.091:48915): table=mangle family=10 entries=6 [ 2207.466363][ T27] audit: type=1325 audit(1582391868.091:48916): table=raw family=10 entries=3 [ 2207.538298][ T27] audit: type=1325 audit(1582391868.091:48917): table=security family=10 entries=4 [ 2207.588839][ T27] audit: type=1325 audit(1582391868.181:48918): table=filter family=3 entries=4 17:17:48 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:48 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x400454ca, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:48 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000080)=0xf0, 0x100001) 17:17:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:17:48 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:48 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:48 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:49 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:49 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40049409, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:17:49 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000080)=0xf0, 0x100001) 17:17:49 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:49 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:49 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4010ae68, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:49 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r6 = socket$inet6(0xa, 0x2, 0x0) sendfile(r6, r5, &(0x7f0000000080)=0xf0, 0x100001) 17:17:49 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:49 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000080)=0xf0, 0x100001) 17:17:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:49 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40186366, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:49 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:49 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r5, r4, &(0x7f0000000080)=0xf0, 0x100001) 17:17:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:49 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x401c5504, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:50 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:50 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r6 = socket$inet6(0xa, 0x2, 0x0) sendfile(r6, r5, &(0x7f0000000080)=0xf0, 0x100001) 17:17:50 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:50 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4020940d, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:50 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r5, r4, &(0x7f0000000080)=0xf0, 0x100001) 17:17:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:50 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:50 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x80045519, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:50 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r5, r4, &(0x7f0000000080)=0xf0, 0x100001) 17:17:50 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x80047437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r6 = socket$inet6(0xa, 0x2, 0x0) sendfile(r6, r5, &(0x7f0000000080)=0xf0, 0x100001) 17:17:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:50 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:50 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:50 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x80086301, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) 17:17:50 executing program 3 (fault-call:3 fault-nth:0): set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:50 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r5, r4, &(0x7f0000000080)=0xf0, 0x100001) 17:17:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) 17:17:51 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:51 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:51 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x805c4d65, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:51 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r4, r3, &(0x7f0000000080)=0xf0, 0x100001) 17:17:51 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:51 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) 17:17:51 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0045878, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:51 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r4, r3, &(0x7f0000000080)=0xf0, 0x100001) 17:17:51 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x3c}}, 0x0) 17:17:51 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r4, r3, &(0x7f0000000080)=0xf0, 0x100001) 17:17:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x3c}}, 0x0) 17:17:54 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0045878, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:17:54 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x2, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) [ 2212.881397][ T27] kauditd_printk_skb: 178 callbacks suppressed [ 2212.881404][ T27] audit: type=1325 audit(1582391874.081:49097): table=filter family=2 entries=4 17:17:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x3c}}, 0x0) [ 2212.953204][ T27] audit: type=1325 audit(1582391874.091:49098): table=nat family=2 entries=5 17:17:54 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:54 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184902, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) [ 2213.031010][ T27] audit: type=1325 audit(1582391874.091:49099): table=mangle family=2 entries=6 17:17:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x38}}, 0x0) [ 2213.110248][ T27] audit: type=1325 audit(1582391874.091:49100): table=raw family=2 entries=3 [ 2213.119053][ T27] audit: type=1325 audit(1582391874.091:49101): table=security family=2 entries=4 17:17:54 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x10, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 2 (fault-call:3 fault-nth:0): set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184903, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2213.265136][ T27] audit: type=1325 audit(1582391874.181:49102): table=filter family=10 entries=4 17:17:54 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) [ 2213.322976][ T27] audit: type=1325 audit(1582391874.181:49103): table=mangle family=10 entries=6 17:17:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x38}}, 0x0) [ 2213.431546][ T27] audit: type=1325 audit(1582391874.181:49104): table=raw family=10 entries=3 17:17:54 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2213.533857][ T27] audit: type=1325 audit(1582391874.181:49105): table=security family=10 entries=4 17:17:54 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r4, r3, &(0x7f0000000080)=0xf0, 0x100001) 17:17:54 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184904, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2213.593366][ T27] audit: type=1325 audit(1582391874.261:49106): table=filter family=2 entries=4 17:17:54 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4c01, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x2, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:54 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r4, r3, &(0x7f0000000080)=0xf0, 0x100001) 17:17:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x38}}, 0x0) 17:17:55 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184905, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x541b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x3c}}, 0x0) 17:17:55 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r4, r3, &(0x7f0000000080)=0xf0, 0x100001) 17:17:55 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184906, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x10, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x3c}}, 0x0) 17:17:55 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184907, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r4, r3, &(0x7f0000000080)=0xf0, 0x100001) 17:17:55 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5421, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x3c}}, 0x0) 17:17:55 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4c01, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:55 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:55 executing program 1: socket$pppl2tp(0x18, 0x1, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) [ 2214.735500][T29607] ion_ioctl: ioctl validate failed 17:17:56 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5450, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x28, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x28}}, 0x0) 17:17:56 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:17:56 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184909, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:56 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x541b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x28, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x28}}, 0x0) 17:17:56 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 17:17:56 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490a, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:56 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:17:56 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5451, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:56 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x28, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x28}}, 0x0) 17:17:56 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5421, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:56 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:17:56 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:56 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x2c}}, 0x0) 17:17:56 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490c, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:56 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5452, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:56 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:17:56 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5450, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x2c}}, 0x0) 17:17:57 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490d, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:57 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:17:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, &(0x7f0000000080)=0xf0, 0x100001) 17:17:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x2c}}, 0x0) 17:17:57 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490e, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:57 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, &(0x7f0000000080)=0xf0, 0x100001) 17:17:57 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5460, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:57 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5451, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:57 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r4, r3, &(0x7f0000000080)=0xf0, 0x100001) 17:17:57 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184910, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:57 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, &(0x7f0000000080)=0xf0, 0x100001) 17:17:57 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:57 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184911, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:57 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5452, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:57 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005}) 17:17:57 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x6364, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, &(0x7f0000000080)=0xf0, 0x100001) 17:17:57 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184912, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, &(0x7f0000000080)=0xf0, 0x100001) 17:17:58 executing program 0 (fault-call:3 fault-nth:0): set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184925, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5460, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x2, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:58 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8912, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, &(0x7f0000000080)=0xf0, 0x100001) 17:17:58 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018495c, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, &(0x7f0000000080)=0xf0, 0x100001) 17:17:58 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x6364, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0189436, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8933, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x4, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:58 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x2, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, &(0x7f0000000080)=0xf0, 0x100001) 17:17:58 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc020660b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8912, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x10, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xa, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, &(0x7f0000000080)=0xf0, 0x100001) 17:17:59 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc038563c, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:59 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x400454ca, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2217.930956][ T27] kauditd_printk_skb: 300 callbacks suppressed [ 2217.930964][ T27] audit: type=1325 audit(1582391879.131:49407): table=security family=10 entries=4 17:17:59 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x1277, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2218.002342][ T27] audit: type=1325 audit(1582391879.151:49408): table=filter family=2 entries=4 17:17:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:17:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xf, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:59 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc080661a, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2218.063952][ T27] audit: type=1325 audit(1582391879.161:49409): table=nat family=2 entries=5 17:17:59 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4c00, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:59 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8933, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2218.175004][ T27] audit: type=1325 audit(1582391879.161:49410): table=mangle family=2 entries=6 17:17:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) [ 2218.249044][ T27] audit: type=1325 audit(1582391879.161:49411): table=raw family=2 entries=3 17:17:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x10, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:17:59 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40049409, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2218.330426][ T27] audit: type=1325 audit(1582391879.161:49412): table=security family=2 entries=4 17:17:59 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010002, 0xffffffffffffffff}) [ 2218.401368][ T27] audit: type=1325 audit(1582391879.231:49413): table=filter family=2 entries=4 17:17:59 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4c01, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2218.477748][ T27] audit: type=1325 audit(1582391879.231:49414): table=nat family=2 entries=5 17:17:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:17:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x4a, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2218.540212][ T27] audit: type=1325 audit(1582391879.241:49415): table=mangle family=2 entries=6 [ 2218.549279][ T27] audit: type=1325 audit(1582391879.241:49416): table=raw family=2 entries=3 17:17:59 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x400454ca, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:59 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5411, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:59 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40186366, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:17:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:17:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x60, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:00 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x541b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x300, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:01 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010003, 0xffffffffffffffff}) 17:18:01 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40049409, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:01 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5421, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:01 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4020940d, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x532, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:01 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5450, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xa00, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:01 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010006, 0xffffffffffffffff}) 17:18:01 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x80086301, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:01 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5451, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:01 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40186366, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xf00, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:01 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010008, 0xffffffffffffffff}) 17:18:02 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5452, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x3205, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:02 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4020940d, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:02 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0045878, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:02 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5460, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x4a00, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:02 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x80086301, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:02 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x6364, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:02 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0045878, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:04 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x5}) 17:18:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x6000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:04 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8912, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:04 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0045878, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:04 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc00c642d, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2223.084699][ T27] kauditd_printk_skb: 150 callbacks suppressed [ 2223.084707][ T27] audit: type=1325 audit(1582391884.281:49567): table=filter family=2 entries=4 17:18:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x77a7, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2223.141470][ T27] audit: type=1325 audit(1582391884.281:49568): table=mangle family=2 entries=6 17:18:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:04 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8918, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2223.198635][ T27] audit: type=1325 audit(1582391884.281:49569): table=raw family=2 entries=3 17:18:04 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x8}) 17:18:04 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184902, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2223.293175][ T27] audit: type=1325 audit(1582391884.281:49570): table=security family=2 entries=4 17:18:04 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0045878, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) [ 2223.378420][ T27] audit: type=1325 audit(1582391884.281:49571): table=filter family=10 entries=4 [ 2223.422779][ T27] audit: type=1325 audit(1582391884.281:49572): table=mangle family=10 entries=6 17:18:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xa777, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2223.503382][ T27] audit: type=1325 audit(1582391884.281:49573): table=raw family=10 entries=3 17:18:04 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xa}) 17:18:04 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8933, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2223.574470][ T27] audit: type=1325 audit(1582391884.281:49574): table=security family=10 entries=4 [ 2223.629662][ T27] audit: type=1325 audit(1582391884.441:49575): table=filter family=10 entries=4 17:18:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:04 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184903, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2223.706404][ T27] audit: type=1325 audit(1582391884.441:49576): table=mangle family=10 entries=6 17:18:04 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x5000000}) 17:18:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x30000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:05 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184902, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:05 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8960, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x6000a0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:05 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x8000000}) 17:18:05 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x89a0, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:05 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184904, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:05 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184903, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x1000000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:05 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xa000000}) 17:18:05 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x89a1, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:05 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x2000000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:05 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184904, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:05 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184905, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:05 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x89e0, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:05 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2}) 17:18:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x3000000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r2, &(0x7f0000000080)=0xf0, 0x100001) 17:18:06 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x400454ca, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:06 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184906, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:06 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184905, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000080)=0xf0, 0x100001) 17:18:06 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40049409, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x4000000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000080)=0xf0, 0x100001) 17:18:06 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184906, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:06 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40186366, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3}) 17:18:08 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184907, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xa000000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000080)=0xf0, 0x100001) 17:18:08 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4020940d, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184907, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xf000000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:08 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x80086301, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x100001) 17:18:08 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4}) 17:18:08 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x10000000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x100001) 17:18:08 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0045878, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5}) 17:18:08 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0045878, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x100001) 17:18:08 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184909, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184909, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x32050000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:08 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184902, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080), 0x100001) 17:18:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x4a000000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:09 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490a, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:09 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490a, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:09 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184903, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2228.200080][ T27] kauditd_printk_skb: 231 callbacks suppressed [ 2228.200088][ T27] audit: type=1325 audit(1582391889.391:49808): table=filter family=2 entries=4 [ 2228.230672][ T27] audit: type=1325 audit(1582391889.391:49809): table=nat family=2 entries=5 [ 2228.280188][ T27] audit: type=1325 audit(1582391889.391:49810): table=mangle family=2 entries=6 [ 2228.280221][ T27] audit: type=1325 audit(1582391889.391:49811): table=raw family=2 entries=3 [ 2228.280238][ T27] audit: type=1325 audit(1582391889.411:49812): table=security family=2 entries=4 [ 2228.280254][ T27] audit: type=1325 audit(1582391889.451:49813): table=filter family=2 entries=4 [ 2228.280269][ T27] audit: type=1325 audit(1582391889.451:49814): table=nat family=2 entries=5 [ 2228.397613][ T27] audit: type=1325 audit(1582391889.451:49815): table=mangle family=2 entries=6 [ 2228.431600][ T27] audit: type=1325 audit(1582391889.451:49816): table=raw family=2 entries=3 [ 2228.458347][ T27] audit: type=1325 audit(1582391889.451:49817): table=security family=2 entries=4 17:18:10 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6}) 17:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080), 0x100001) 17:18:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x60000000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:10 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184904, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:10 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:10 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080), 0x100001) 17:18:10 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184905, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x9effffff, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:10 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490c, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:10 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x7}) 17:18:10 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184906, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:10 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490c, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xa0006000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x0) 17:18:11 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x8}) 17:18:11 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184907, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xa7770000, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x0) 17:18:11 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490d, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:11 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490d, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:11 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xefffffff, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r3, r2, &(0x7f0000000080)=0xf0, 0x0) 17:18:11 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184909, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xf0ffffff, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:11 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490e, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x9}) 17:18:13 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490e, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490a, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xfcffffff, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:13 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184910, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184910, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xffffff7f, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:13 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa}) 17:18:13 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184911, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xffffff9e, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:13 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490c, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb}) 17:18:13 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184911, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xffffffef, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:13 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490d, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:13 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184912, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:14 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xfffffff0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:14 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018490e, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:14 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184912, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:14 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:14 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184918, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2233.338856][ T27] kauditd_printk_skb: 171 callbacks suppressed [ 2233.338864][ T27] audit: type=1325 audit(1582391894.531:49989): table=filter family=2 entries=4 [ 2233.404771][ T27] audit: type=1325 audit(1582391894.561:49990): table=nat family=2 entries=5 [ 2233.415741][ T27] audit: type=1325 audit(1582391894.561:49991): table=mangle family=2 entries=6 [ 2233.425275][ T27] audit: type=1325 audit(1582391894.561:49992): table=raw family=2 entries=3 [ 2233.436198][ T27] audit: type=1325 audit(1582391894.561:49993): table=security family=2 entries=4 17:18:15 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc}) 17:18:15 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184910, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xfffffffc, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:15 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:15 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184925, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:15 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184925, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2234.547009][ T27] audit: type=1325 audit(1582391895.741:49994): table=filter family=10 entries=4 17:18:15 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0xffffffff, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2234.611049][ T27] audit: type=1325 audit(1582391895.781:49995): table=mangle family=10 entries=6 [ 2234.694717][ T27] audit: type=1325 audit(1582391895.781:49996): table=raw family=10 entries=3 17:18:15 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018495c, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:15 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018495c, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:15 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184911, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2234.764119][ T27] audit: type=1325 audit(1582391895.781:49997): table=security family=10 entries=4 17:18:16 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd}) 17:18:16 executing program 1: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x10, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2234.872517][ T27] audit: type=1325 audit(1582391895.891:49998): table=filter family=10 entries=4 17:18:16 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184912, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x14, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:16 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0189436, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc01849fe, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 1: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184925, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe}) 17:18:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:16 executing program 1: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc018495c, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0189436, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc020660b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0xec0, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:16 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0189436, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0305615, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:16 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:17 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc020660b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:18 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x10}) 17:18:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0xf001, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:18 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:18 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc020660b, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:18 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010002, 0xffffffffffffffff}) 17:18:18 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010004, 0xffffffffffffffff}) 17:18:18 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, 0x0) 17:18:18 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0286405, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:18 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010008, 0xffffffffffffffff}) 17:18:18 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010003, 0xffffffffffffffff}) 17:18:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x33fe0, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:18 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x11}) 17:18:18 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, 0x0) 17:18:19 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0305615, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x20001580, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:19 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, 0x0) 17:18:19 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x1001000f, 0xffffffffffffffff}) 17:18:19 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010002, 0xffffffffffffffff}) 17:18:19 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 17:18:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x7ffff000, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:19 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010006, 0xffffffffffffffff}) 17:18:19 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)) 17:18:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0xfffff001, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2238.356872][ T27] kauditd_printk_skb: 156 callbacks suppressed [ 2238.356878][ T27] audit: type=1325 audit(1582391899.551:50155): table=filter family=10 entries=4 [ 2238.434413][ T27] audit: type=1325 audit(1582391899.571:50156): table=mangle family=10 entries=6 [ 2238.506121][ T27] audit: type=1325 audit(1582391899.581:50157): table=raw family=10 entries=3 [ 2238.651274][ T27] audit: type=1325 audit(1582391899.851:50158): table=filter family=10 entries=4 [ 2238.680655][ T27] audit: type=1325 audit(1582391899.861:50159): table=mangle family=10 entries=6 [ 2238.745453][ T27] audit: type=1325 audit(1582391899.861:50160): table=raw family=10 entries=3 [ 2238.794114][ T27] audit: type=1325 audit(1582391899.871:50161): table=security family=10 entries=4 [ 2239.158685][ T27] audit: type=1325 audit(1582391900.351:50162): table=filter family=10 entries=4 [ 2239.187549][ T27] audit: type=1325 audit(1582391900.351:50163): table=mangle family=10 entries=6 [ 2239.243318][ T27] audit: type=1325 audit(1582391900.351:50164): table=raw family=10 entries=3 17:18:21 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x12}) 17:18:21 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)) 17:18:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0xfffffdef, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:21 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010008, 0xffffffffffffffff}) 17:18:21 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x5}) 17:18:21 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010003, 0xffffffffffffffff}) 17:18:21 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)) 17:18:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x2, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:21 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x2, &(0x7f00000001c0)) 17:18:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x3, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:21 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x10, &(0x7f00000001c0)) 17:18:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x5, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2240.906093][ T6491] syz-executor.0: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz0,mems_allowed=0-1 [ 2240.972332][ T6491] CPU: 0 PID: 6491 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 2240.980963][ T6491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2240.991016][ T6491] Call Trace: [ 2240.994315][ T6491] dump_stack+0x1fb/0x318 [ 2240.998654][ T6491] warn_alloc+0x17d/0x2c0 [ 2241.003130][ T6491] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2241.009574][ T6491] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2241.015157][ T6491] ? __next_zones_zonelist+0xb0/0x170 [ 2241.020565][ T6491] __alloc_pages_nodemask+0x39a/0x5d0 [ 2241.025981][ T6491] alloc_pages_current+0x2db/0x500 [ 2241.031129][ T6491] ion_page_pool_alloc+0x4be/0x5e0 [ 2241.036257][ T6491] ion_system_heap_allocate+0x210/0xb90 [ 2241.041832][ T6491] ion_ioctl+0x45f/0x10a0 [ 2241.046196][ T6491] ? debug_shrink_set+0x130/0x130 [ 2241.051242][ T6491] __se_sys_ioctl+0x113/0x190 [ 2241.055974][ T6491] __x64_sys_ioctl+0x7b/0x90 [ 2241.060577][ T6491] do_syscall_64+0xf7/0x1c0 [ 2241.065094][ T6491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2241.071018][ T6491] RIP: 0033:0x45c429 [ 2241.074929][ T6491] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2241.094538][ T6491] RSP: 002b:00007f5029792c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2241.102979][ T6491] RAX: ffffffffffffffda RBX: 00007f50297936d4 RCX: 000000000045c429 [ 2241.111036][ T6491] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 2241.119030][ T6491] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2241.127028][ T6491] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2241.135016][ T6491] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c 17:18:22 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4c00, &(0x7f00000001c0)) 17:18:22 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x25}) 17:18:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x6, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:22 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x5}) 17:18:22 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x8}) [ 2241.228622][ T6491] Mem-Info: [ 2241.232037][ T6491] active_anon:170548 inactive_anon:229 isolated_anon:0 [ 2241.232037][ T6491] active_file:5072 inactive_file:10515 isolated_file:12 [ 2241.232037][ T6491] unevictable:0 dirty:117 writeback:0 unstable:0 [ 2241.232037][ T6491] slab_reclaimable:17693 slab_unreclaimable:133156 [ 2241.232037][ T6491] mapped:59028 shmem:303 pagetables:3146 bounce:0 [ 2241.232037][ T6491] free:951958 free_pcp:324 free_cma:0 [ 2241.467007][ T6491] Node 0 active_anon:675116kB inactive_anon:912kB active_file:17644kB inactive_file:41284kB unevictable:0kB isolated(anon):0kB isolated(file):48kB mapped:234096kB dirty:436kB writeback:0kB shmem:1204kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 454656kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2241.600032][ T6491] Node 0 DMA free:10672kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:172kB inactive_file:668kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2241.706481][ T6491] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2241.730116][ T6491] Node 0 DMA32 free:63076kB min:50612kB low:59680kB high:68748kB reserved_highatomic:2048KB active_anon:674988kB inactive_anon:916kB active_file:17540kB inactive_file:36876kB unevictable:0kB writepending:436kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10476kB pagetables:11800kB bounce:0kB free_pcp:2052kB local_pcp:1412kB free_cma:0kB [ 2241.890038][ T6491] lowmem_reserve[]: 0 0 0 0 0 [ 2241.894781][ T6491] Node 0 Normal free:4kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2242.069971][ T6491] lowmem_reserve[]: 0 0 0 0 0 [ 2242.074861][ T6491] Node 0 DMA: 33*4kB (UME) 10*8kB (UME) 6*16kB (UME) 10*32kB (UM) 4*64kB (UME) 3*128kB (ME) 2*256kB (UE) 7*512kB (UME) 3*1024kB (UE) 1*2048kB (E) 0*4096kB = 10484kB [ 2242.147923][ T6491] Node 0 DMA32: 5834*4kB (UMEH) 2380*8kB (UMEH) 2688*16kB (UMEH) 1885*32kB (UMEH) 303*64kB (UMH) 101*128kB (UH) 57*256kB (UH) 0*512kB 5*1024kB (U) 0*2048kB 0*4096kB = 197736kB [ 2242.214179][ T6491] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2242.273316][ T6491] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2242.299967][ T6491] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2242.309348][ T6491] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2242.339993][ T6491] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2242.349534][ T6491] 8238 total pagecache pages [ 2242.379983][ T6491] 0 pages in swap cache [ 2242.384250][ T6491] Swap cache stats: add 0, delete 0, find 0/0 [ 2242.390920][ T6491] Free swap = 0kB [ 2242.397093][ T6491] Total swap = 0kB [ 2242.407426][ T6491] 1965979 pages RAM [ 2242.420317][ T6491] 0 pages HighMem/MovableOnly [ 2242.430821][ T6491] 339072 pages reserved [ 2242.434991][ T6491] 0 pages cma reserved 17:18:23 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010006, 0xffffffffffffffff}) 17:18:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x8, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:23 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4c01, &(0x7f00000001c0)) 17:18:23 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xa}) 17:18:23 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5c}) 17:18:23 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x8}) 17:18:23 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x541b, &(0x7f00000001c0)) 17:18:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x300, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:24 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xa}) 17:18:24 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x5000000}) 17:18:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:24 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5421, &(0x7f00000001c0)) [ 2243.364978][ T27] kauditd_printk_skb: 100 callbacks suppressed [ 2243.364986][ T27] audit: type=1325 audit(1582391904.561:50265): table=filter family=2 entries=4 17:18:24 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010008, 0xffffffffffffffff}) 17:18:24 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x5000000}) 17:18:24 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5450, &(0x7f00000001c0)) 17:18:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x2, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:24 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x300}) 17:18:24 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x8000000}) [ 2243.490046][ T27] audit: type=1325 audit(1582391904.561:50266): table=mangle family=2 entries=6 [ 2243.524013][ T27] audit: type=1325 audit(1582391904.571:50267): table=raw family=2 entries=3 17:18:24 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5451, &(0x7f00000001c0)) [ 2243.578730][ T27] audit: type=1325 audit(1582391904.571:50268): table=security family=2 entries=4 17:18:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x3, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2243.629303][ T27] audit: type=1325 audit(1582391904.581:50269): table=filter family=10 entries=4 17:18:24 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xa000000}) 17:18:24 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x8000000}) [ 2243.735776][ T27] audit: type=1325 audit(1582391904.581:50270): table=mangle family=10 entries=6 17:18:25 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5452, &(0x7f00000001c0)) [ 2243.801159][ T27] audit: type=1325 audit(1582391904.581:50271): table=raw family=10 entries=3 17:18:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x4, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2243.894398][ T27] audit: type=1325 audit(1582391904.591:50272): table=security family=10 entries=4 [ 2243.968519][ T27] audit: type=1325 audit(1582391904.611:50273): table=filter family=2 entries=4 [ 2244.024910][ T27] audit: type=1325 audit(1582391904.611:50274): table=nat family=2 entries=5 17:18:25 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x5}) 17:18:25 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5460, &(0x7f00000001c0)) 17:18:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xa, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:25 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xa000000}) 17:18:25 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffff000a}) 17:18:25 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x500}) 17:18:25 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x6364, &(0x7f00000001c0)) 17:18:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xf, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:25 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffff0a}) 17:18:26 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:26 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x7439, &(0x7f00000001c0)) 17:18:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x10, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:26 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x8}) 17:18:26 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8912, &(0x7f00000001c0)) 17:18:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x4a, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:26 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:26 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x600}) 17:18:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x60, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:26 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x8933, &(0x7f00000001c0)) 17:18:26 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xa}) 17:18:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x300, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:27 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2}) 17:18:27 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x400454ca, &(0x7f00000001c0)) 17:18:27 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x5000000}) 17:18:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x532, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:27 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2}) 17:18:27 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x700}) 17:18:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xa00, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:27 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x8000000}) 17:18:27 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40049409, &(0x7f00000001c0)) 17:18:28 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40186366, &(0x7f00000001c0)) 17:18:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xf00, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:28 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xa000000}) 17:18:28 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x4020940d, &(0x7f00000001c0)) 17:18:28 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3}) 17:18:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x3205, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:28 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) 17:18:28 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3}) 17:18:29 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x900}) 17:18:29 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x80086301, &(0x7f00000001c0)) 17:18:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x4a00, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:29 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4}) 17:18:29 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2}) 17:18:29 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0045878, &(0x7f00000001c0)) 17:18:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x6000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2248.464666][ T27] kauditd_printk_skb: 169 callbacks suppressed [ 2248.464673][ T27] audit: type=1325 audit(1582391909.661:50444): table=filter family=3 entries=4 [ 2248.549450][ T27] audit: type=1325 audit(1582391909.691:50445): table=filter family=10 entries=4 17:18:29 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0045878, &(0x7f00000001c0)) [ 2248.613709][ T27] audit: type=1325 audit(1582391909.691:50446): table=mangle family=10 entries=6 [ 2248.679301][ T27] audit: type=1325 audit(1582391909.691:50447): table=raw family=10 entries=3 17:18:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x77a7, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2248.748884][ T27] audit: type=1325 audit(1582391909.701:50448): table=security family=10 entries=4 17:18:30 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4}) 17:18:30 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184907, &(0x7f00000001c0)) [ 2248.873609][ T27] audit: type=1325 audit(1582391910.071:50449): table=filter family=2 entries=4 [ 2248.902302][ T27] audit: type=1325 audit(1582391910.081:50450): table=nat family=2 entries=5 17:18:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xa777, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2248.970085][ T27] audit: type=1325 audit(1582391910.081:50451): table=mangle family=2 entries=6 [ 2249.004437][ T27] audit: type=1325 audit(1582391910.081:50452): table=raw family=2 entries=3 [ 2249.085708][ T27] audit: type=1325 audit(1582391910.081:50453): table=security family=2 entries=4 17:18:30 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa00}) 17:18:30 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0189436, &(0x7f00000001c0)) 17:18:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x30000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:31 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5}) 17:18:31 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3}) 17:18:31 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5}) 17:18:31 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc020660b, &(0x7f00000001c0)) 17:18:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x6000a0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:31 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x2}) 17:18:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x1000000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:31 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x3}) 17:18:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x2000000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:31 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x4}) 17:18:31 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb00}) 17:18:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x3000000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:32 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6}) 17:18:32 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4}) 17:18:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x5}) 17:18:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x4000000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:32 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6}) 17:18:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x6}) 17:18:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xa000000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x7}) 17:18:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xf000000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x8}) 17:18:33 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc00}) 17:18:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x10000000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:33 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x7}) 17:18:33 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x9}) 17:18:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x32050000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:33 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5}) 17:18:33 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x7}) 17:18:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x4a000000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:34 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xa}) 17:18:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x60000000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:34 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xb}) 17:18:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x9effffff, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2253.247386][ T9659] warn_alloc: 4 callbacks suppressed [ 2253.247399][ T9659] syz-executor.3: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz3,mems_allowed=0-1 [ 2253.448241][ T9659] CPU: 0 PID: 9659 Comm: syz-executor.3 Not tainted 5.6.0-rc2-syzkaller #0 [ 2253.457068][ T9659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2253.467238][ T9659] Call Trace: [ 2253.470548][ T9659] dump_stack+0x1fb/0x318 [ 2253.474905][ T9659] warn_alloc+0x17d/0x2c0 [ 2253.479266][ T9659] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2253.485707][ T9659] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2253.491298][ T9659] ? __next_zones_zonelist+0xb0/0x170 [ 2253.496882][ T9659] __alloc_pages_nodemask+0x39a/0x5d0 [ 2253.502315][ T9659] alloc_pages_current+0x2db/0x500 [ 2253.507585][ T9659] ion_page_pool_alloc+0x4be/0x5e0 [ 2253.512717][ T9659] ion_system_heap_allocate+0x210/0xb90 [ 2253.518463][ T9659] ion_ioctl+0x45f/0x10a0 [ 2253.522996][ T9659] ? debug_shrink_set+0x130/0x130 [ 2253.528039][ T9659] __se_sys_ioctl+0x113/0x190 [ 2253.532738][ T9659] __x64_sys_ioctl+0x7b/0x90 [ 2253.537347][ T9659] do_syscall_64+0xf7/0x1c0 [ 2253.541884][ T9659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2253.547801][ T9659] RIP: 0033:0x45c429 [ 2253.551709][ T9659] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2253.571326][ T9659] RSP: 002b:00007fe72e922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2253.579747][ T9659] RAX: ffffffffffffffda RBX: 00007fe72e9236d4 RCX: 000000000045c429 [ 2253.587833][ T9659] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 2253.595850][ T9659] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2253.603993][ T9659] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2253.611993][ T9659] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2253.767950][ T27] kauditd_printk_skb: 107 callbacks suppressed [ 2253.767958][ T27] audit: type=1325 audit(1582391914.961:50561): table=filter family=2 entries=4 [ 2253.814801][ T27] audit: type=1325 audit(1582391914.981:50562): table=nat family=2 entries=5 [ 2253.835891][ T27] audit: type=1325 audit(1582391914.991:50563): table=mangle family=2 entries=6 [ 2253.847917][ T27] audit: type=1325 audit(1582391914.991:50564): table=raw family=2 entries=3 17:18:35 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd00}) 17:18:35 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xc}) [ 2253.894804][ T27] audit: type=1325 audit(1582391914.991:50565): table=security family=2 entries=4 [ 2253.928256][ T27] audit: type=1325 audit(1582391914.991:50566): table=filter family=10 entries=4 [ 2253.965469][ T27] audit: type=1325 audit(1582391914.991:50567): table=mangle family=10 entries=6 [ 2254.011171][ T27] audit: type=1325 audit(1582391914.991:50568): table=raw family=10 entries=3 [ 2254.040238][ T27] audit: type=1325 audit(1582391915.001:50569): table=security family=10 entries=4 [ 2254.062871][ T27] audit: type=1325 audit(1582391915.191:50570): table=filter family=10 entries=4 [ 2254.083483][ T9659] Mem-Info: [ 2254.086709][ T9659] active_anon:170528 inactive_anon:231 isolated_anon:0 [ 2254.086709][ T9659] active_file:5045 inactive_file:4090 isolated_file:0 [ 2254.086709][ T9659] unevictable:0 dirty:62 writeback:0 unstable:0 [ 2254.086709][ T9659] slab_reclaimable:17362 slab_unreclaimable:133385 17:18:35 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x8}) 17:18:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xa0006000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:35 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6}) 17:18:35 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xd}) [ 2254.086709][ T9659] mapped:58958 shmem:303 pagetables:3052 bounce:0 [ 2254.086709][ T9659] free:929408 free_pcp:337 free_cma:0 [ 2254.450115][ T9659] Node 0 active_anon:673220kB inactive_anon:924kB active_file:17536kB inactive_file:15584kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:233916kB dirty:220kB writeback:0kB shmem:1212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 448512kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2254.660270][ T9659] Node 0 DMA free:10824kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:152kB inactive_file:688kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2254.770520][ T9659] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2254.777166][ T9659] Node 0 DMA32 free:330116kB min:36276kB low:45344kB high:54412kB reserved_highatomic:2048KB active_anon:670972kB inactive_anon:924kB active_file:17436kB inactive_file:14840kB unevictable:0kB writepending:252kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10544kB pagetables:12008kB bounce:0kB free_pcp:1608kB local_pcp:1132kB free_cma:0kB [ 2254.813701][ T9659] lowmem_reserve[]: 0 0 0 0 0 [ 2254.821277][ T9659] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2254.871451][ T9659] lowmem_reserve[]: 0 0 0 0 0 [ 2254.887259][ T9659] Node 0 DMA: 32*4kB (UME) 9*8kB (UME) 6*16kB (UME) 7*32kB (UM) 10*64kB (UME) 4*128kB (UME) 2*256kB (UE) 7*512kB (UME) 3*1024kB (UE) 1*2048kB (E) 0*4096kB = 10888kB [ 2254.910326][ T9659] Node 0 DMA32: 194*4kB (EH) 1543*8kB (UEH) 3324*16kB (UEH) 1710*32kB (UEH) 1071*64kB (UMEH) 517*128kB (UMH) 328*256kB (UMH) 72*512kB (U) 4*1024kB (U) 1*2048kB (M) 0*4096kB = 382720kB [ 2254.954584][ T9659] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2254.990378][ T9659] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2255.020011][ T9659] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2255.035830][ T9659] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2255.061374][ T9659] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2255.082927][ T9659] 8246 total pagecache pages [ 2255.097744][ T9659] 0 pages in swap cache [ 2255.105015][ T9659] Swap cache stats: add 0, delete 0, find 0/0 [ 2255.122022][ T9659] Free swap = 0kB [ 2255.135264][ T9659] Total swap = 0kB [ 2255.144744][ T9659] 1965979 pages RAM [ 2255.157711][ T9659] 0 pages HighMem/MovableOnly [ 2255.175878][ T9659] 339072 pages reserved [ 2255.188551][ T9659] 0 pages cma reserved 17:18:36 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x8}) 17:18:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xa7770000, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xe}) 17:18:36 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe00}) 17:18:36 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x9}) 17:18:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10}) 17:18:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xefffffff, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x11}) 17:18:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xf0ffffff, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:37 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x12}) 17:18:37 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x7}) 17:18:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xfcffffff, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:38 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x9}) 17:18:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x25}) 17:18:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xffffff7f, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:38 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1100}) 17:18:38 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x8}) 17:18:38 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa}) 17:18:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x5c}) 17:18:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xffffff9e, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:38 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa}) 17:18:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xffffffef, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x300}) 17:18:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x500}) 17:18:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xfffffff0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:39 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x532}) 17:18:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xfffffffc, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:39 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1200}) 17:18:40 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x9}) 17:18:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x600}) 17:18:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0xffffffff, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:40 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb}) 17:18:40 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb}) [ 2259.045729][ T27] kauditd_printk_skb: 116 callbacks suppressed [ 2259.045737][ T27] audit: type=1325 audit(1582391920.241:50687): table=filter family=2 entries=4 17:18:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x700}) 17:18:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:40 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2500}) [ 2259.146537][ T27] audit: type=1325 audit(1582391920.241:50688): table=nat family=2 entries=5 [ 2259.229771][ T27] audit: type=1325 audit(1582391920.241:50689): table=mangle family=2 entries=6 [ 2259.302274][ T27] audit: type=1325 audit(1582391920.241:50690): table=raw family=2 entries=3 17:18:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x900}) [ 2259.356379][ T27] audit: type=1325 audit(1582391920.241:50691): table=security family=2 entries=4 17:18:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x2, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2259.425522][ T27] audit: type=1325 audit(1582391920.241:50692): table=filter family=10 entries=4 [ 2259.492801][ T27] audit: type=1325 audit(1582391920.241:50693): table=mangle family=10 entries=6 17:18:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xa00}) [ 2259.555873][ T27] audit: type=1325 audit(1582391920.241:50694): table=raw family=10 entries=3 17:18:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x3, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2259.613726][ T27] audit: type=1325 audit(1582391920.241:50695): table=security family=10 entries=4 [ 2259.696933][ T27] audit: type=1325 audit(1582391920.401:50696): table=filter family=10 entries=4 17:18:41 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa}) 17:18:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xb00}) 17:18:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x4, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:41 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc}) 17:18:41 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc}) 17:18:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xa, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xc00}) 17:18:42 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5c00}) 17:18:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xd00}) 17:18:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xf, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:42 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd}) 17:18:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xe00}) 17:18:43 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb}) 17:18:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x10, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:43 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x1100}) 17:18:43 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd}) 17:18:43 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x1200}) 17:18:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x4a, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x60, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6000a0}) 17:18:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x2500}) 17:18:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x300, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:44 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe}) 17:18:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x3205}) 17:18:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x532, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:44 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc}) 17:18:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x5c00}) 17:18:44 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe}) 17:18:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xa00, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2263.296431][T11318] warn_alloc: 9 callbacks suppressed [ 2263.296449][T11318] syz-executor.0: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz0,mems_allowed=0-1 17:18:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x6000a0}) [ 2263.440263][T11318] CPU: 0 PID: 11318 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 2263.448984][T11318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2263.459060][T11318] Call Trace: [ 2263.462352][T11318] dump_stack+0x1fb/0x318 [ 2263.466725][T11318] warn_alloc+0x17d/0x2c0 [ 2263.471097][T11318] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2263.477568][T11318] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2263.483146][T11318] ? __next_zones_zonelist+0xb0/0x170 [ 2263.488560][T11318] __alloc_pages_nodemask+0x39a/0x5d0 [ 2263.493961][T11318] alloc_pages_current+0x2db/0x500 [ 2263.499076][T11318] ion_page_pool_alloc+0x4be/0x5e0 [ 2263.504317][T11318] ion_system_heap_allocate+0x210/0xb90 [ 2263.509911][T11318] ion_ioctl+0x45f/0x10a0 [ 2263.514277][T11318] ? debug_shrink_set+0x130/0x130 [ 2263.519308][T11318] __se_sys_ioctl+0x113/0x190 [ 2263.524046][T11318] __x64_sys_ioctl+0x7b/0x90 [ 2263.528653][T11318] do_syscall_64+0xf7/0x1c0 [ 2263.533169][T11318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2263.539074][T11318] RIP: 0033:0x45c429 [ 2263.542967][T11318] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2263.562583][T11318] RSP: 002b:00007f5029792c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2263.571093][T11318] RAX: ffffffffffffffda RBX: 00007f50297936d4 RCX: 000000000045c429 [ 2263.579061][T11318] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 17:18:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xf00, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2263.587039][T11318] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2263.595031][T11318] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2263.603021][T11318] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2263.797978][T11318] Mem-Info: [ 2263.805440][T11318] active_anon:170061 inactive_anon:228 isolated_anon:0 [ 2263.805440][T11318] active_file:4489 inactive_file:3718 isolated_file:0 [ 2263.805440][T11318] unevictable:0 dirty:94 writeback:0 unstable:0 [ 2263.805440][T11318] slab_reclaimable:17670 slab_unreclaimable:132676 [ 2263.805440][T11318] mapped:58958 shmem:303 pagetables:3152 bounce:0 [ 2263.805440][T11318] free:920648 free_pcp:227 free_cma:0 [ 2263.972422][T11318] Node 0 active_anon:671064kB inactive_anon:912kB active_file:15332kB inactive_file:14096kB unevictable:0kB isolated(anon):48kB isolated(file):0kB mapped:233836kB dirty:344kB writeback:0kB shmem:1212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 446464kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2264.012820][T11318] Node 0 DMA free:12044kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:80kB inactive_file:760kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2264.049507][T11318] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2264.056429][T11318] Node 0 DMA32 free:350960kB min:36276kB low:45344kB high:54412kB reserved_highatomic:2048KB active_anon:671064kB inactive_anon:912kB active_file:15248kB inactive_file:13336kB unevictable:0kB writepending:340kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10576kB pagetables:12208kB bounce:0kB free_pcp:572kB local_pcp:504kB free_cma:0kB [ 2264.125176][T11318] lowmem_reserve[]: 0 0 0 0 0 [ 2264.160422][T11318] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2264.290028][T11318] lowmem_reserve[]: 0 0 0 0 0 [ 2264.294856][T11318] Node 0 DMA: 29*4kB (UM) 9*8kB (UME) 5*16kB (ME) 10*32kB (UM) 17*64kB (UME) 9*128kB (UME) 2*256kB (UE) 7*512kB (UME) 3*1024kB (UE) 1*2048kB (E) 0*4096kB = 12044kB [ 2264.359801][T11318] Node 0 DMA32: 1326*4kB (UMEH) 5780*8kB (UMEH) 3046*16kB (UMEH) 1670*32kB (UMEH) 14*64kB (UMEH) 354*128kB (UMH) 270*256kB (UMH) 46*512kB (U) 2*1024kB (U) 2*2048kB (U) 0*4096kB = 298744kB 17:18:45 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1000000}) 17:18:45 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x1000000}) 17:18:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x3205, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2264.410114][T11318] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2264.441030][T11318] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2264.455807][T11318] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2264.521464][T11318] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2264.523560][ T27] kauditd_printk_skb: 113 callbacks suppressed [ 2264.523566][ T27] audit: type=1325 audit(1582391925.721:50810): table=filter family=10 entries=4 [ 2264.573664][T11318] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2264.617805][ T27] audit: type=1325 audit(1582391925.731:50811): table=mangle family=10 entries=6 [ 2264.625639][T11318] 8255 total pagecache pages [ 2264.632929][T11318] 0 pages in swap cache [ 2264.660468][T11318] Swap cache stats: add 0, delete 0, find 0/0 [ 2264.683668][T11318] Free swap = 0kB [ 2264.693792][T11318] Total swap = 0kB [ 2264.699535][T11318] 1965979 pages RAM [ 2264.705218][T11318] 0 pages HighMem/MovableOnly [ 2264.706751][ T27] audit: type=1325 audit(1582391925.731:50812): table=raw family=10 entries=3 [ 2264.717129][T11318] 339072 pages reserved [ 2264.735324][T11318] 0 pages cma reserved [ 2264.740320][ T27] audit: type=1325 audit(1582391925.731:50813): table=security family=10 entries=4 [ 2264.749627][ T27] audit: type=1325 audit(1582391925.831:50814): table=filter family=2 entries=4 [ 2264.822891][ T27] audit: type=1325 audit(1582391925.841:50815): table=mangle family=2 entries=6 [ 2264.870895][ T27] audit: type=1325 audit(1582391925.841:50816): table=raw family=2 entries=3 [ 2264.879783][ T27] audit: type=1325 audit(1582391925.841:50817): table=security family=2 entries=4 [ 2264.940461][ T27] audit: type=1325 audit(1582391925.841:50818): table=filter family=10 entries=4 [ 2264.949653][ T27] audit: type=1325 audit(1582391925.841:50819): table=mangle family=10 entries=6 17:18:46 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x10}) 17:18:46 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x10}) 17:18:46 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x2000000}) 17:18:46 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd}) 17:18:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x4a00, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:46 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x3000000}) 17:18:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x6000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:46 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x4000000}) 17:18:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x77a7, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:47 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2000000}) 17:18:47 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x5000000}) 17:18:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xa777, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:48 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x11}) 17:18:48 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe}) 17:18:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x6000000}) 17:18:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x30000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:48 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x11}) 17:18:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x7000000}) 17:18:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x6000a0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x8000000}) 17:18:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x1000000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:49 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3000000}) 17:18:49 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x9000000}) 17:18:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x2000000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:49 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x12}) 17:18:49 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x10}) 17:18:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x3000000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:49 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xa000000}) 17:18:49 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x12}) 17:18:49 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4000000}) 17:18:49 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xb000000}) 17:18:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x4000000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:50 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xc000000}) 17:18:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xa000000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:50 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xd000000}) 17:18:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xf000000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2269.904545][ T27] kauditd_printk_skb: 130 callbacks suppressed [ 2269.904552][ T27] audit: type=1325 audit(1582391931.101:50950): table=filter family=2 entries=4 17:18:51 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x18}) 17:18:51 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xe000000}) 17:18:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x10000000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:51 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x25}) 17:18:51 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x11}) [ 2269.949500][ T27] audit: type=1325 audit(1582391931.121:50951): table=nat family=2 entries=5 17:18:51 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5000000}) [ 2270.040026][ T27] audit: type=1325 audit(1582391931.121:50952): table=mangle family=2 entries=6 17:18:51 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x10000000}) 17:18:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x32050000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2270.108862][ T27] audit: type=1325 audit(1582391931.121:50953): table=raw family=2 entries=3 17:18:51 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x12}) [ 2270.188728][ T27] audit: type=1325 audit(1582391931.121:50954): table=security family=2 entries=4 [ 2270.264186][ T27] audit: type=1325 audit(1582391931.121:50955): table=filter family=10 entries=4 17:18:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x4a000000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2270.341748][ T27] audit: type=1325 audit(1582391931.121:50956): table=mangle family=10 entries=6 17:18:51 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x11000000}) [ 2270.414536][ T27] audit: type=1325 audit(1582391931.121:50957): table=raw family=10 entries=3 [ 2270.455497][ T27] audit: type=1325 audit(1582391931.121:50958): table=security family=10 entries=4 [ 2270.537286][ T27] audit: type=1325 audit(1582391931.231:50959): table=filter family=2 entries=4 17:18:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x60000000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:52 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x12000000}) 17:18:52 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5c}) 17:18:52 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x25}) 17:18:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x9effffff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:52 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x25}) 17:18:54 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6000000}) 17:18:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x25000000}) 17:18:54 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5c}) 17:18:54 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1f0}) 17:18:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xa0006000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x32050000}) 17:18:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x5c000000}) 17:18:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xa7770000, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xa0006000}) 17:18:54 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5c}) 17:18:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xefffffff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x1000000000000}) 17:18:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xf0ffffff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:55 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1f0}) 17:18:55 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x7000000}) 17:18:55 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x6000a0ffffffff}) 17:18:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xfcffffff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:55 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xf0}) 17:18:55 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x300}) 17:18:55 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x100000000000000}) 17:18:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xffffff7f, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:55 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x200000000000000}) 17:18:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xffffff9e, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2274.833356][T13020] warn_alloc: 11 callbacks suppressed [ 2274.833384][T13020] syz-executor.3: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz3,mems_allowed=0-1 [ 2274.870109][T13020] CPU: 0 PID: 13020 Comm: syz-executor.3 Not tainted 5.6.0-rc2-syzkaller #0 [ 2274.878798][T13020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2274.888854][T13020] Call Trace: [ 2274.892159][T13020] dump_stack+0x1fb/0x318 [ 2274.896510][T13020] warn_alloc+0x17d/0x2c0 [ 2274.900856][T13020] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2274.907288][T13020] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2274.912857][T13020] ? __next_zones_zonelist+0xb0/0x170 [ 2274.918398][T13020] __alloc_pages_nodemask+0x39a/0x5d0 [ 2274.923837][T13020] alloc_pages_current+0x2db/0x500 [ 2274.928972][T13020] ion_page_pool_alloc+0x4be/0x5e0 [ 2274.934090][T13020] ion_system_heap_allocate+0x210/0xb90 [ 2274.939660][T13020] ion_ioctl+0x45f/0x10a0 [ 2274.944040][T13020] ? debug_shrink_set+0x130/0x130 [ 2274.949101][T13020] __se_sys_ioctl+0x113/0x190 [ 2274.953781][T13020] __x64_sys_ioctl+0x7b/0x90 [ 2274.958434][T13020] do_syscall_64+0xf7/0x1c0 [ 2274.962974][T13020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2274.968876][T13020] RIP: 0033:0x45c429 [ 2274.972767][T13020] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2274.992400][T13020] RSP: 002b:00007fe72e922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2275.000812][T13020] RAX: ffffffffffffffda RBX: 00007fe72e9236d4 RCX: 000000000045c429 [ 2275.008790][T13020] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 2275.016763][T13020] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2275.024786][T13020] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 17:18:56 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x300000000000000}) 17:18:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xffffffef, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2275.032756][T13020] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2275.136038][ T27] kauditd_printk_skb: 123 callbacks suppressed [ 2275.136044][ T27] audit: type=1325 audit(1582391936.331:51083): table=filter family=10 entries=4 [ 2275.214310][ T27] audit: type=1325 audit(1582391936.351:51084): table=mangle family=10 entries=6 [ 2275.309278][ T27] audit: type=1325 audit(1582391936.361:51085): table=raw family=10 entries=3 [ 2275.349863][ T27] audit: type=1325 audit(1582391936.361:51086): table=security family=10 entries=4 [ 2275.390606][T13020] Mem-Info: [ 2275.405694][T13020] active_anon:171228 inactive_anon:229 isolated_anon:12 [ 2275.405694][T13020] active_file:2449 inactive_file:1672 isolated_file:0 [ 2275.405694][T13020] unevictable:0 dirty:54 writeback:0 unstable:0 [ 2275.405694][T13020] slab_reclaimable:17627 slab_unreclaimable:132558 [ 2275.405694][T13020] mapped:54858 shmem:303 pagetables:3135 bounce:0 [ 2275.405694][T13020] free:930396 free_pcp:532 free_cma:0 17:18:56 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x300}) [ 2275.512401][T13020] Node 0 active_anon:673492kB inactive_anon:916kB active_file:6384kB inactive_file:5636kB unevictable:0kB isolated(anon):48kB isolated(file):0kB mapped:216716kB dirty:196kB writeback:0kB shmem:1212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 448512kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2275.540280][ T27] audit: type=1325 audit(1582391936.711:51087): table=filter family=2 entries=4 [ 2275.547128][T13020] Node 0 DMA free:10532kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:24kB inactive_anon:0kB active_file:128kB inactive_file:568kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2275.582560][ T27] audit: type=1325 audit(1582391936.751:51088): table=nat family=2 entries=5 [ 2275.587134][T13020] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2275.597815][T13020] Node 0 DMA32 free:202544kB min:115844kB low:124912kB high:133980kB reserved_highatomic:2048KB active_anon:673380kB inactive_anon:924kB active_file:6324kB inactive_file:5120kB unevictable:0kB writepending:224kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10480kB pagetables:11912kB bounce:0kB free_pcp:2168kB local_pcp:1408kB free_cma:0kB [ 2275.632206][ T27] audit: type=1325 audit(1582391936.751:51089): table=mangle family=2 entries=6 [ 2275.638042][T13020] lowmem_reserve[]: 0 0 0 0 0 17:18:56 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x8000000}) 17:18:56 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x400000000000000}) 17:18:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xfffffff0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2275.646731][T13020] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2275.700088][ T27] audit: type=1325 audit(1582391936.751:51090): table=raw family=2 entries=3 [ 2275.727725][ T27] audit: type=1325 audit(1582391936.751:51091): table=security family=2 entries=4 [ 2275.799681][ T27] audit: type=1325 audit(1582391936.751:51092): table=filter family=10 entries=4 [ 2275.898695][T13020] lowmem_reserve[]: 0 0 0 0 0 [ 2275.922586][T13020] Node 0 DMA: 3*4kB (UM) 5*8kB (UME) 9*16kB (UME) 0*32kB 4*64kB (UE) 1*128kB (E) 5*256kB (UME) 5*512kB (UE) 4*1024kB (UME) 1*2048kB (E) 0*4096kB = 10564kB [ 2275.989967][T13020] Node 0 DMA32: 165*4kB (MEH) 992*8kB (UMEH) 3523*16kB (UMEH) 784*32kB (UEH) 832*64kB (UMEH) 167*128kB (UMH) 56*256kB (UH) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 179012kB [ 2276.050025][T13020] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2276.080224][T13020] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2276.089796][T13020] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2276.251250][T13020] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2276.270976][T13020] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2276.287303][T13020] 4345 total pagecache pages [ 2276.293929][T13020] 0 pages in swap cache [ 2276.306621][T13020] Swap cache stats: add 0, delete 0, find 0/0 [ 2276.313399][T13020] Free swap = 0kB [ 2276.352834][T13020] Total swap = 0kB [ 2276.356642][T13020] 1965979 pages RAM [ 2276.403250][T13020] 0 pages HighMem/MovableOnly [ 2276.408044][T13020] 339072 pages reserved [ 2276.420242][T13020] 0 pages cma reserved 17:18:58 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xfe}) 17:18:58 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x500000000000000}) 17:18:58 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x500}) 17:18:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xfffffffc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:58 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x500}) 17:18:58 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x9000000}) 17:18:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0xffffffff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:58 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x600000000000000}) 17:18:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:58 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x700000000000000}) 17:18:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x3}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:58 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x800000000000000}) [ 2277.525852][T13317] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2277.587281][T13319] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 17:18:59 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x300}) 17:18:59 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x900000000000000}) 17:18:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:18:59 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x532}) 17:19:00 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x532}) 17:19:00 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa000000}) 17:19:00 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xa00000000000000}) 17:19:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:00 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x600}) 17:19:00 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x500}) 17:19:00 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xb00000000000000}) 17:19:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:00 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xc00000000000000}) 17:19:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x3}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:00 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xd00000000000000}) 17:19:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x4}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:01 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x600}) 17:19:01 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xe00000000000000}) 17:19:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0xa}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:01 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x700}) 17:19:01 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb000000}) [ 2280.315256][ T27] kauditd_printk_skb: 132 callbacks suppressed [ 2280.315264][ T27] audit: type=1325 audit(1582391941.511:51225): table=filter family=2 entries=4 [ 2280.375346][ T27] audit: type=1325 audit(1582391941.531:51226): table=nat family=2 entries=5 [ 2280.416894][ T27] audit: type=1325 audit(1582391941.531:51227): table=mangle family=2 entries=6 [ 2280.460229][ T27] audit: type=1325 audit(1582391941.531:51228): table=raw family=2 entries=3 [ 2280.506933][ T27] audit: type=1325 audit(1582391941.531:51229): table=security family=2 entries=4 [ 2280.555761][ T27] audit: type=1325 audit(1582391941.531:51230): table=filter family=10 entries=4 [ 2280.586805][ T27] audit: type=1325 audit(1582391941.531:51231): table=mangle family=10 entries=6 [ 2280.616552][ T27] audit: type=1325 audit(1582391941.551:51232): table=raw family=10 entries=3 [ 2280.626880][ T27] audit: type=1325 audit(1582391941.551:51233): table=security family=10 entries=4 17:19:02 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x58a}) 17:19:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0xf}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:02 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x1000000000000000}) 17:19:02 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x900}) 17:19:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x10}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2280.908845][ T27] audit: type=1325 audit(1582391942.101:51234): table=filter family=10 entries=4 17:19:02 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x1100000000000000}) 17:19:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x4a}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:02 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x700}) 17:19:02 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x1200000000000000}) 17:19:02 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa00}) 17:19:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x60}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:03 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc000000}) 17:19:03 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x600}) 17:19:03 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x2500000000000000}) 17:19:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:03 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x3205000000000000}) 17:19:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x3}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:03 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x5c00000000000000}) 17:19:04 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x900}) 17:19:04 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb00}) 17:19:04 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xffffffff00000000}) 17:19:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x4}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:04 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd000000}) 17:19:04 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x700}) 17:19:04 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0xffffffffa0006000}) 17:19:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0xa}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0xf}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:05 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)) 17:19:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x10}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:05 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x2}) 17:19:06 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa00}) 17:19:06 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc00}) 17:19:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x4a}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:06 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x3}) [ 2285.591190][ T27] kauditd_printk_skb: 107 callbacks suppressed [ 2285.591205][ T27] audit: type=1325 audit(1582391946.791:51342): table=filter family=2 entries=4 [ 2285.648048][ T27] audit: type=1325 audit(1582391946.801:51343): table=nat family=2 entries=5 [ 2285.683754][ T27] audit: type=1325 audit(1582391946.801:51344): table=mangle family=2 entries=6 17:19:06 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe000000}) 17:19:06 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x900}) 17:19:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x60}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:06 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x4}) 17:19:06 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd00}) [ 2285.790912][ T27] audit: type=1325 audit(1582391946.801:51345): table=raw family=2 entries=3 17:19:07 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb00}) 17:19:07 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x5}) [ 2285.846059][ T27] audit: type=1325 audit(1582391946.801:51346): table=security family=2 entries=4 17:19:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x300}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2285.911479][ T27] audit: type=1325 audit(1582391946.801:51347): table=filter family=10 entries=4 [ 2285.976600][ T27] audit: type=1325 audit(1582391946.811:51348): table=mangle family=10 entries=6 [ 2286.055014][ T27] audit: type=1325 audit(1582391946.811:51349): table=raw family=10 entries=3 17:19:07 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x6}) [ 2286.114047][ T27] audit: type=1325 audit(1582391946.811:51350): table=security family=10 entries=4 17:19:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x532}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2286.168392][ T27] audit: type=1325 audit(1582391946.981:51351): table=filter family=10 entries=4 [ 2286.262172][T14613] warn_alloc: 10 callbacks suppressed [ 2286.262186][T14613] syz-executor.3: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz3,mems_allowed=0-1 17:19:07 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x7}) [ 2286.390212][T14613] CPU: 1 PID: 14613 Comm: syz-executor.3 Not tainted 5.6.0-rc2-syzkaller #0 [ 2286.398912][T14613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2286.408966][T14613] Call Trace: [ 2286.412261][T14613] dump_stack+0x1fb/0x318 [ 2286.416603][T14613] warn_alloc+0x17d/0x2c0 [ 2286.420962][T14613] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2286.427418][T14613] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2286.433030][T14613] ? __next_zones_zonelist+0xb0/0x170 [ 2286.438441][T14613] __alloc_pages_nodemask+0x39a/0x5d0 [ 2286.443839][T14613] alloc_pages_current+0x2db/0x500 [ 2286.448964][T14613] ion_page_pool_alloc+0x4be/0x5e0 [ 2286.454109][T14613] ion_system_heap_allocate+0x210/0xb90 [ 2286.459689][T14613] ion_ioctl+0x45f/0x10a0 [ 2286.464054][T14613] ? debug_shrink_set+0x130/0x130 [ 2286.469092][T14613] __se_sys_ioctl+0x113/0x190 [ 2286.473794][T14613] __x64_sys_ioctl+0x7b/0x90 [ 2286.478415][T14613] do_syscall_64+0xf7/0x1c0 [ 2286.482946][T14613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2286.488844][T14613] RIP: 0033:0x45c429 [ 2286.492755][T14613] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2286.512383][T14613] RSP: 002b:00007fe72e922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2286.520905][T14613] RAX: ffffffffffffffda RBX: 00007fe72e9236d4 RCX: 000000000045c429 [ 2286.528878][T14613] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 17:19:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0xa00}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2286.536860][T14613] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2286.544834][T14613] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2286.552807][T14613] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c 17:19:08 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x10000000}) [ 2287.255342][T14613] Mem-Info: [ 2287.259612][T14613] active_anon:170622 inactive_anon:230 isolated_anon:12 [ 2287.259612][T14613] active_file:2436 inactive_file:1085 isolated_file:0 [ 2287.259612][T14613] unevictable:0 dirty:100 writeback:0 unstable:0 [ 2287.259612][T14613] slab_reclaimable:17666 slab_unreclaimable:132452 [ 2287.259612][T14613] mapped:54341 shmem:303 pagetables:3030 bounce:0 [ 2287.259612][T14613] free:949796 free_pcp:471 free_cma:0 [ 2287.299101][T14613] Node 0 active_anon:673320kB inactive_anon:920kB active_file:6332kB inactive_file:3260kB unevictable:0kB isolated(anon):48kB isolated(file):0kB mapped:214472kB dirty:368kB writeback:0kB shmem:1212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 448512kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2287.331724][T14613] Node 0 DMA free:10492kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:8kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2287.410111][T14613] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2287.415975][T14613] Node 0 DMA32 free:93412kB min:36276kB low:45344kB high:54412kB reserved_highatomic:2048KB active_anon:673308kB inactive_anon:920kB active_file:6204kB inactive_file:3284kB unevictable:0kB writepending:364kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10424kB pagetables:11868kB bounce:0kB free_pcp:2112kB local_pcp:908kB free_cma:0kB [ 2287.456536][T14613] lowmem_reserve[]: 0 0 0 0 0 [ 2287.461785][T14613] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2287.589959][T14613] lowmem_reserve[]: 0 0 0 0 0 [ 2287.594855][T14613] Node 0 DMA: 13*4kB (UM) 15*8kB (UME) 11*16kB (UME) 7*32kB (UM) 9*64kB (UME) 5*128kB (UE) 3*256kB (UME) 5*512kB (UE) 2*1024kB (ME) 2*2048kB (UE) 0*4096kB = 11260kB [ 2287.640511][T14613] Node 0 DMA32: 135*4kB (EH) 467*8kB (UEH) 1524*16kB (UEH) 604*32kB (UMEH) 1472*64kB (UMEH) 710*128kB (UH) 261*256kB (UH) 10*512kB (U) 2*1024kB (U) 0*2048kB 0*4096kB = 307060kB [ 2287.680018][T14613] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2287.707329][T14613] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2287.729989][T14613] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2287.752282][T14613] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2287.772447][T14613] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2287.793480][T14613] 3724 total pagecache pages [ 2287.798203][T14613] 0 pages in swap cache [ 2287.811962][T14613] Swap cache stats: add 0, delete 0, find 0/0 [ 2287.822514][T14613] Free swap = 0kB [ 2287.834824][T14613] Total swap = 0kB [ 2287.838584][T14613] 1965979 pages RAM [ 2287.861661][T14613] 0 pages HighMem/MovableOnly [ 2287.866490][T14613] 339072 pages reserved [ 2287.903130][T14613] 0 pages cma reserved 17:19:09 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa00}) 17:19:09 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x8}) 17:19:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0xf00}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:09 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe00}) 17:19:09 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc00}) 17:19:09 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x11000000}) 17:19:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x3205}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:09 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x9}) 17:19:10 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xa}) 17:19:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x4a00}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:10 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xb}) 17:19:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x6000}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:11 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb00}) 17:19:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0x77a7}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:11 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xc}) 17:19:11 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1100}) 17:19:11 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x12000000}) 17:19:11 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd00}) 17:19:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {0x5, 0x0, 0xa777}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:11 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xd}) 17:19:11 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xe}) 17:19:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x4, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:11 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x10}) [ 2290.552385][T15142] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2290.612088][T15143] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:19:11 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x11}) [ 2290.831486][ T27] kauditd_printk_skb: 91 callbacks suppressed [ 2290.831494][ T27] audit: type=1325 audit(1582391952.031:51443): table=filter family=10 entries=4 [ 2290.920459][ T27] audit: type=1325 audit(1582391952.061:51444): table=mangle family=10 entries=6 [ 2290.967258][ T27] audit: type=1325 audit(1582391952.061:51445): table=raw family=10 entries=3 [ 2291.001911][ T27] audit: type=1325 audit(1582391952.071:51446): table=security family=10 entries=4 17:19:12 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc00}) 17:19:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:12 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x12}) [ 2291.343972][ T27] audit: type=1325 audit(1582391952.541:51447): table=filter family=10 entries=4 [ 2291.376376][ T27] audit: type=1325 audit(1582391952.551:51448): table=filter family=2 entries=4 [ 2291.380552][T15359] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2291.412194][ T27] audit: type=1325 audit(1582391952.551:51449): table=nat family=2 entries=5 [ 2291.452321][ T27] audit: type=1325 audit(1582391952.551:51450): table=mangle family=2 entries=6 [ 2291.471220][ T27] audit: type=1325 audit(1582391952.551:51451): table=raw family=2 entries=3 [ 2291.482676][ T27] audit: type=1325 audit(1582391952.551:51452): table=security family=2 entries=4 [ 2291.540862][T15366] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 17:19:13 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1200}) 17:19:13 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x25000000}) 17:19:13 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe00}) 17:19:13 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x25}) 17:19:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:13 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd00}) [ 2291.999461][T15479] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:19:13 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x5c}) [ 2292.055584][T15481] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:19:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:13 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x300}) 17:19:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x5, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:13 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x500}) [ 2292.564491][T15494] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 2292.638241][T15497] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 17:19:13 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x532}) 17:19:14 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2500}) 17:19:14 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5c000000}) 17:19:15 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1100}) 17:19:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x6, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:15 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x600}) 17:19:15 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe00}) 17:19:15 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3205}) [ 2293.876926][T15720] netlink: 'syz-executor.4': attribute type 6 has an invalid length. [ 2293.935013][T15725] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 17:19:15 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x700}) 17:19:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x8, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:15 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x900}) 17:19:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x300, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:15 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xa00}) 17:19:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:16 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa0006000}) 17:19:16 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xb00}) 17:19:16 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1200}) 17:19:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x0, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2296.343458][ T27] kauditd_printk_skb: 102 callbacks suppressed [ 2296.343466][ T27] audit: type=1325 audit(1582391957.541:51555): table=filter family=2 entries=4 [ 2296.372322][ T27] audit: type=1325 audit(1582391957.541:51556): table=nat family=2 entries=5 [ 2296.401415][ T27] audit: type=1325 audit(1582391957.541:51557): table=mangle family=2 entries=6 17:19:17 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xc00}) 17:19:17 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3f00}) 17:19:17 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2500}) 17:19:17 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xf36}) 17:19:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x3, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:17 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xffffffff}) [ 2296.492665][ T27] audit: type=1325 audit(1582391957.541:51558): table=raw family=2 entries=3 [ 2296.530066][T16076] warn_alloc: 13 callbacks suppressed 17:19:17 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xd00}) [ 2296.530083][T16076] syz-executor.3: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz3,mems_allowed=0-1 [ 2296.604238][ T27] audit: type=1325 audit(1582391957.541:51559): table=security family=2 entries=4 [ 2296.605062][T16081] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2296.665261][T16076] CPU: 0 PID: 16076 Comm: syz-executor.3 Not tainted 5.6.0-rc2-syzkaller #0 [ 2296.673969][T16076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2296.684013][T16076] Call Trace: [ 2296.687313][T16076] dump_stack+0x1fb/0x318 [ 2296.691751][T16076] warn_alloc+0x17d/0x2c0 [ 2296.696092][T16076] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2296.702701][T16076] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2296.708288][T16076] ? __next_zones_zonelist+0xb0/0x170 [ 2296.713696][T16076] __alloc_pages_nodemask+0x39a/0x5d0 [ 2296.719105][T16076] alloc_pages_current+0x2db/0x500 [ 2296.724237][T16076] ion_page_pool_alloc+0x4be/0x5e0 [ 2296.729358][T16076] ion_system_heap_allocate+0x210/0xb90 [ 2296.734945][T16076] ion_ioctl+0x45f/0x10a0 [ 2296.739315][T16076] ? debug_shrink_set+0x130/0x130 [ 2296.744352][T16076] __se_sys_ioctl+0x113/0x190 [ 2296.749051][T16076] __x64_sys_ioctl+0x7b/0x90 [ 2296.752222][T16087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2296.753649][T16076] do_syscall_64+0xf7/0x1c0 [ 2296.753669][T16076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2296.753679][T16076] RIP: 0033:0x45c429 [ 2296.753690][T16076] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2296.753696][T16076] RSP: 002b:00007fe72e922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2296.753712][T16076] RAX: ffffffffffffffda RBX: 00007fe72e9236d4 RCX: 000000000045c429 17:19:18 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xe00}) [ 2296.813229][T16076] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 2296.821202][T16076] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2296.829220][T16076] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2296.837219][T16076] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2296.849622][ T27] audit: type=1325 audit(1582391957.571:51560): table=filter family=2 entries=4 17:19:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x4, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2296.874980][ T27] audit: type=1325 audit(1582391957.571:51561): table=mangle family=2 entries=6 [ 2296.899486][ T27] audit: type=1325 audit(1582391957.571:51562): table=raw family=2 entries=3 [ 2297.010107][T16076] Mem-Info: [ 2297.013529][T16076] active_anon:170239 inactive_anon:230 isolated_anon:0 [ 2297.013529][T16076] active_file:2409 inactive_file:2351 isolated_file:0 [ 2297.013529][T16076] unevictable:0 dirty:5 writeback:1 unstable:0 [ 2297.013529][T16076] slab_reclaimable:17808 slab_unreclaimable:131316 [ 2297.013529][T16076] mapped:55093 shmem:303 pagetables:3129 bounce:0 [ 2297.013529][T16076] free:960100 free_pcp:716 free_cma:0 [ 2297.047816][ T27] audit: type=1325 audit(1582391957.571:51563): table=security family=2 entries=4 17:19:18 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x1100}) [ 2297.110372][ T27] audit: type=1325 audit(1582391957.761:51564): table=security family=10 entries=4 17:19:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x10, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:18 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x1200}) [ 2297.353022][T16150] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2297.450626][T16202] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2297.552876][T16076] Node 0 active_anon:671432kB inactive_anon:920kB active_file:5492kB inactive_file:5728kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:215152kB dirty:108kB writeback:0kB shmem:1208kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 446464kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2297.790489][T16076] Node 0 DMA free:11556kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:40kB inactive_file:80kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2297.864175][T16076] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2297.897166][T16076] Node 0 DMA32 free:223384kB min:115844kB low:124912kB high:133980kB reserved_highatomic:2048KB active_anon:671332kB inactive_anon:920kB active_file:5448kB inactive_file:5648kB unevictable:0kB writepending:104kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10428kB pagetables:11836kB bounce:0kB free_pcp:1712kB local_pcp:568kB free_cma:0kB 17:19:19 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4000}) 17:19:19 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x2500}) 17:19:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x3, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:19 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff}) [ 2298.029820][T16076] lowmem_reserve[]: 0 0 0 0 0 [ 2298.039746][T16076] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2298.114837][T16316] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2298.164080][T16318] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2298.280391][T16076] lowmem_reserve[]: 0 0 0 0 0 [ 2298.285584][T16076] Node 0 DMA: 33*4kB (UME) 14*8kB (U) 13*16kB (UE) 17*32kB (U) 3*64kB (UE) 3*128kB (UME) 3*256kB (UME) 4*512kB (UME) 4*1024kB (UME) 1*2048kB (E) 0*4096kB = 10532kB [ 2298.370576][T16076] Node 0 DMA32: 1339*4kB (UMEH) 6056*8kB (UMEH) 2463*16kB (UMEH) 1270*32kB (UH) 238*64kB (UH) 159*128kB (UH) 6*256kB (UH) 0*512kB 12*1024kB (U) 0*2048kB 0*4096kB = 183260kB [ 2298.440048][T16076] Node 0 Normal: 1*4kB (U) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4kB [ 2298.506399][T16076] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2298.574786][T16076] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2298.631401][T16076] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2298.694108][T16076] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2298.760206][T16076] 5114 total pagecache pages [ 2298.764845][T16076] 0 pages in swap cache [ 2298.769043][T16076] Swap cache stats: add 0, delete 0, find 0/0 [ 2298.820445][T16076] Free swap = 0kB [ 2298.824189][T16076] Total swap = 0kB [ 2298.828030][T16076] 1965979 pages RAM [ 2298.888748][T16076] 0 pages HighMem/MovableOnly [ 2298.899770][T16076] 339072 pages reserved [ 2298.924606][T16076] 0 pages cma reserved 17:19:20 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xf37}) 17:19:20 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3205}) 17:19:20 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x3205}) 17:19:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x5, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:20 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2}) 17:19:20 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5c00}) 17:19:20 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x5c00}) 17:19:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x8, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:20 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x6000a0}) 17:19:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x3, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2299.430851][T16351] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:19:20 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x1000000}) [ 2299.474693][T16352] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:19:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x4, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:21 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x2000000}) 17:19:21 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xf001}) 17:19:21 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4000}) 17:19:21 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3}) 17:19:21 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1100}) 17:19:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2300.635448][T16578] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 2300.675381][T16581] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 17:19:21 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x3000000}) 17:19:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:22 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x4000000}) [ 2300.986582][T16587] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2301.063122][T16591] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:19:22 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x5000000}) 17:19:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x5, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:22 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x6000000}) [ 2301.325831][T16597] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 2301.385277][T16601] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 2301.553871][ T27] kauditd_printk_skb: 112 callbacks suppressed [ 2301.553878][ T27] audit: type=1325 audit(1582391962.751:51677): table=filter family=10 entries=4 [ 2301.571476][ T27] audit: type=1325 audit(1582391962.771:51678): table=mangle family=10 entries=6 [ 2301.630218][ T27] audit: type=1325 audit(1582391962.771:51679): table=raw family=10 entries=3 [ 2301.708538][ T27] audit: type=1325 audit(1582391962.771:51680): table=security family=10 entries=4 [ 2301.740525][ T27] audit: type=1325 audit(1582391962.911:51681): table=filter family=2 entries=4 [ 2301.791460][ T27] audit: type=1325 audit(1582391962.911:51682): table=nat family=2 entries=5 [ 2301.821037][ T27] audit: type=1325 audit(1582391962.911:51683): table=mangle family=2 entries=6 [ 2301.850371][ T27] audit: type=1325 audit(1582391962.921:51684): table=raw family=2 entries=3 [ 2301.859160][ T27] audit: type=1325 audit(1582391962.921:51685): table=security family=2 entries=4 [ 2301.887101][ T27] audit: type=1325 audit(1582391962.921:51686): table=filter family=10 entries=4 17:19:23 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1200}) 17:19:23 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x7000000}) 17:19:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x6, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:23 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x400000}) 17:19:23 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4}) 17:19:23 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5c00}) [ 2302.223498][T16819] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 17:19:23 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x8000000}) [ 2302.297095][T16834] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 17:19:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x8, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:23 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x9000000}) 17:19:23 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xf001}) 17:19:23 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xa000000}) 17:19:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x9, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:24 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1800}) 17:19:24 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xb000000}) 17:19:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0xa, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:25 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6000a0}) 17:19:25 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5}) 17:19:25 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xc000000}) 17:19:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0xb, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:25 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2000}) 17:19:25 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x400000}) 17:19:25 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xd000000}) 17:19:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x10, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x11, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:25 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xe000000}) 17:19:25 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x10000000}) 17:19:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x12, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:26 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x80ffff}) 17:19:26 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6}) 17:19:26 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x11000000}) 17:19:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x13, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:27 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2500}) 17:19:27 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6000a0}) 17:19:27 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x12000000}) 17:19:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x14, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:27 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1000000}) 17:19:27 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 17:19:27 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x25000000}) 17:19:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:27 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x32050000}) 17:19:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x0, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2306.575559][ T27] kauditd_printk_skb: 111 callbacks suppressed [ 2306.575567][ T27] audit: type=1325 audit(1582391967.771:51798): table=filter family=10 entries=4 [ 2306.662829][ T27] audit: type=1325 audit(1582391967.771:51799): table=mangle family=10 entries=6 17:19:27 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x5c000000}) [ 2306.724674][ T27] audit: type=1325 audit(1582391967.771:51800): table=raw family=10 entries=3 [ 2306.773218][ T27] audit: type=1325 audit(1582391967.791:51801): table=security family=10 entries=4 17:19:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2306.845952][ T27] audit: type=1325 audit(1582391967.961:51802): table=filter family=3 entries=4 [ 2306.924116][ T27] audit: type=1325 audit(1582391967.961:51803): table=filter family=10 entries=4 [ 2306.999250][ T27] audit: type=1325 audit(1582391967.961:51804): table=mangle family=10 entries=6 [ 2307.001628][T17577] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2307.063059][ T27] audit: type=1325 audit(1582391967.971:51805): table=raw family=10 entries=3 [ 2307.110220][ T27] audit: type=1325 audit(1582391967.981:51806): table=security family=10 entries=4 [ 2307.131915][T17673] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2307.163214][ T27] audit: type=1325 audit(1582391968.091:51807): table=filter family=10 entries=4 17:19:28 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x360f}) [ 2307.237453][T17532] warn_alloc: 8 callbacks suppressed [ 2307.237466][T17532] syz-executor.2: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz2,mems_allowed=0-1 [ 2307.330133][T17532] CPU: 0 PID: 17532 Comm: syz-executor.2 Not tainted 5.6.0-rc2-syzkaller #0 [ 2307.338818][T17532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2307.348876][T17532] Call Trace: [ 2307.352245][T17532] dump_stack+0x1fb/0x318 [ 2307.356603][T17532] warn_alloc+0x17d/0x2c0 [ 2307.360937][T17532] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2307.367381][T17532] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2307.372977][T17532] ? __next_zones_zonelist+0xb0/0x170 [ 2307.378411][T17532] __alloc_pages_nodemask+0x39a/0x5d0 [ 2307.383822][T17532] alloc_pages_current+0x2db/0x500 [ 2307.388953][T17532] ion_page_pool_alloc+0x4be/0x5e0 [ 2307.394079][T17532] ion_system_heap_allocate+0x210/0xb90 [ 2307.399663][T17532] ion_ioctl+0x45f/0x10a0 [ 2307.404035][T17532] ? debug_shrink_set+0x130/0x130 [ 2307.409064][T17532] __se_sys_ioctl+0x113/0x190 [ 2307.413751][T17532] __x64_sys_ioctl+0x7b/0x90 [ 2307.418352][T17532] do_syscall_64+0xf7/0x1c0 [ 2307.422861][T17532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2307.428751][T17532] RIP: 0033:0x45c429 [ 2307.432640][T17532] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2307.452238][T17532] RSP: 002b:00007fd9dff67c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2307.460632][T17532] RAX: ffffffffffffffda RBX: 00007fd9dff686d4 RCX: 000000000045c429 [ 2307.468586][T17532] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 2307.476540][T17532] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2307.484604][T17532] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2307.492594][T17532] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2307.581297][T17532] Mem-Info: [ 2307.584665][T17532] active_anon:170162 inactive_anon:231 isolated_anon:15 [ 2307.584665][T17532] active_file:2395 inactive_file:1556 isolated_file:0 [ 2307.584665][T17532] unevictable:0 dirty:94 writeback:0 unstable:0 [ 2307.584665][T17532] slab_reclaimable:17613 slab_unreclaimable:132542 [ 2307.584665][T17532] mapped:54531 shmem:303 pagetables:3104 bounce:0 [ 2307.584665][T17532] free:969690 free_pcp:318 free_cma:0 [ 2307.639672][T17532] Node 0 active_anon:671372kB inactive_anon:924kB active_file:5208kB inactive_file:2844kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:213284kB dirty:340kB writeback:0kB shmem:1212kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 446464kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2307.808723][T17532] Node 0 DMA free:10692kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:16kB inactive_anon:0kB active_file:116kB inactive_file:12kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2307.847082][T17532] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2307.853168][T17532] Node 0 DMA32 free:390264kB min:38324kB low:47392kB high:56460kB reserved_highatomic:2048KB active_anon:671216kB inactive_anon:924kB active_file:5088kB inactive_file:2832kB unevictable:0kB writepending:336kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10416kB pagetables:12016kB bounce:0kB free_pcp:1732kB local_pcp:736kB free_cma:0kB [ 2307.901181][T17532] lowmem_reserve[]: 0 0 0 0 0 [ 2307.906080][T17532] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2307.941279][T17532] lowmem_reserve[]: 0 0 0 0 0 [ 2307.946090][T17532] Node 0 DMA: 15*4kB (UME) 2*8kB (UM) 10*16kB (UME) 1*32kB (U) 3*64kB (UME) 6*128kB (UE) 5*256kB (UME) 4*512kB (UME) 2*1024kB (ME) 2*2048kB (UE) 0*4096kB = 10700kB [ 2307.969425][T17532] Node 0 DMA32: 5932*4kB (UEH) 2366*8kB (UEH) 2204*16kB (UEH) 1539*32kB (UH) 2128*64kB (UMH) 512*128kB (UMH) 177*256kB (UH) 29*512kB (UM) 1*1024kB (U) 0*2048kB 0*4096kB = 390080kB [ 2307.993244][T17532] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2308.006520][T17532] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2308.019801][T17532] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2308.036083][T17532] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2308.045788][T17532] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2308.082012][T17532] 4137 total pagecache pages [ 2308.086713][T17532] 0 pages in swap cache [ 2308.107320][T17532] Swap cache stats: add 0, delete 0, find 0/0 [ 2308.113770][T17532] Free swap = 0kB [ 2308.117524][T17532] Total swap = 0kB [ 2308.121374][T17532] 1965979 pages RAM [ 2308.125185][T17532] 0 pages HighMem/MovableOnly 17:19:29 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x80ffff}) 17:19:29 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xa0006000}) 17:19:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x10}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:29 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8}) 17:19:29 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x370f}) 17:19:29 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1f0ffff}) [ 2308.129936][T17532] 339072 pages reserved [ 2308.134089][T17532] 0 pages cma reserved 17:19:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4, 0x5}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:29 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0xffffffff}) 17:19:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4, 0x10}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:29 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)) 17:19:30 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x2}) 17:19:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2308.902961][T17897] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2308.995009][T17899] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:19:30 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x3}) 17:19:30 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1000000}) 17:19:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x5}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2309.358799][T18108] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2309.397184][T18109] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:19:31 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9}) 17:19:31 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2000000}) 17:19:31 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x4}) 17:19:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:31 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3f00}) 17:19:31 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x5}) [ 2310.059148][T18121] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2310.113811][T18125] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:19:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x9}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2310.369494][T18169] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:19:31 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x6}) 17:19:31 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x7}) [ 2310.471194][T18251] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:19:31 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1f0ffff}) 17:19:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0xa}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:31 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4000}) [ 2310.758804][T18348] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2310.801000][T18349] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:19:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x8}) 17:19:32 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa}) 17:19:32 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3000000}) 17:19:32 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2000000}) 17:19:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x9}) 17:19:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0xb}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xa}) 17:19:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0xc}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xb}) [ 2311.774019][ T27] kauditd_printk_skb: 124 callbacks suppressed [ 2311.774027][ T27] audit: type=1325 audit(1582391972.971:51932): table=filter family=10 entries=4 [ 2311.797623][ T27] audit: type=1325 audit(1582391972.981:51933): table=mangle family=10 entries=6 17:19:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x10}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2311.855584][ T27] audit: type=1325 audit(1582391972.991:51934): table=raw family=10 entries=3 17:19:33 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xc}) [ 2311.927121][ T27] audit: type=1325 audit(1582391972.991:51935): table=security family=10 entries=4 [ 2311.988438][T18585] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2311.989339][ T27] audit: type=1325 audit(1582391973.121:51936): table=filter family=10 entries=4 [ 2312.062731][T18588] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2312.099736][ T27] audit: type=1325 audit(1582391973.121:51937): table=mangle family=10 entries=6 [ 2312.151269][ T27] audit: type=1325 audit(1582391973.121:51938): table=raw family=10 entries=3 [ 2312.202826][ T27] audit: type=1325 audit(1582391973.121:51939): table=security family=10 entries=4 17:19:33 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5c00}) 17:19:33 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xd}) [ 2312.456404][ T27] audit: type=1325 audit(1582391973.651:51940): table=filter family=2 entries=4 [ 2312.470652][ T27] audit: type=1325 audit(1582391973.651:51941): table=nat family=2 entries=5 17:19:33 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb}) 17:19:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x11}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:33 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4000000}) 17:19:33 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xe}) 17:19:33 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3000000}) [ 2312.713971][T18705] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 17:19:33 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x10}) [ 2312.760947][T18710] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 17:19:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x12}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:34 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x11}) [ 2313.026615][T18720] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2313.107867][T18722] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 17:19:34 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x12}) 17:19:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x13}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2313.372700][T18731] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2313.446631][T18737] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 17:19:35 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x8a05}) 17:19:35 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x25}) 17:19:35 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xc}) 17:19:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x14}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:35 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5000000}) 17:19:35 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x5c}) 17:19:35 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4000000}) 17:19:35 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xfeff}) [ 2314.612392][T19045] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 17:19:35 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x300}) [ 2314.709059][T19056] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 17:19:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x500}) 17:19:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x5}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x532}) 17:19:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:37 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd}) 17:19:37 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x600}) 17:19:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:37 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6000000}) 17:19:37 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5000000}) 17:19:37 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xfffe}) 17:19:37 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x700}) 17:19:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2316.780725][ T27] kauditd_printk_skb: 82 callbacks suppressed [ 2316.780732][ T27] audit: type=1325 audit(1582391977.981:52024): table=filter family=10 entries=4 17:19:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x900}) [ 2316.853580][ T27] audit: type=1325 audit(1582391978.001:52025): table=mangle family=10 entries=6 17:19:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2316.917133][ T27] audit: type=1325 audit(1582391978.001:52026): table=raw family=10 entries=3 [ 2317.004712][ T27] audit: type=1325 audit(1582391978.011:52027): table=security family=10 entries=4 [ 2317.088967][ T27] audit: type=1325 audit(1582391978.141:52028): table=filter family=3 entries=4 17:19:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xa00}) 17:19:38 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x166dd}) [ 2317.150048][ T27] audit: type=1325 audit(1582391978.161:52029): table=filter family=10 entries=4 [ 2317.239350][ T27] audit: type=1325 audit(1582391978.161:52030): table=mangle family=10 entries=6 [ 2317.302925][ T27] audit: type=1325 audit(1582391978.171:52031): table=filter family=10 entries=4 [ 2317.320692][T19421] warn_alloc: 12 callbacks suppressed [ 2317.320724][T19421] syz-executor.3: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz3,mems_allowed=0-1 [ 2317.404293][ T27] audit: type=1325 audit(1582391978.171:52032): table=raw family=10 entries=3 [ 2317.420264][T19421] CPU: 1 PID: 19421 Comm: syz-executor.3 Not tainted 5.6.0-rc2-syzkaller #0 [ 2317.428973][T19421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2317.439037][T19421] Call Trace: [ 2317.442334][T19421] dump_stack+0x1fb/0x318 [ 2317.446678][T19421] warn_alloc+0x17d/0x2c0 [ 2317.451035][T19421] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2317.457521][T19421] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2317.459160][ T27] audit: type=1325 audit(1582391978.171:52033): table=security family=10 entries=4 [ 2317.463077][T19421] ? __next_zones_zonelist+0xb0/0x170 [ 2317.463134][T19421] __alloc_pages_nodemask+0x39a/0x5d0 [ 2317.463163][T19421] alloc_pages_current+0x2db/0x500 [ 2317.463187][T19421] ion_page_pool_alloc+0x4be/0x5e0 [ 2317.463204][T19421] ion_system_heap_allocate+0x210/0xb90 [ 2317.463239][T19421] ion_ioctl+0x45f/0x10a0 [ 2317.503369][T19421] ? debug_shrink_set+0x130/0x130 [ 2317.508503][T19421] __se_sys_ioctl+0x113/0x190 [ 2317.513188][T19421] __x64_sys_ioctl+0x7b/0x90 [ 2317.517791][T19421] do_syscall_64+0xf7/0x1c0 [ 2317.522315][T19421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2317.528214][T19421] RIP: 0033:0x45c429 [ 2317.532150][T19421] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2317.551749][T19421] RSP: 002b:00007fe72e922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2317.560157][T19421] RAX: ffffffffffffffda RBX: 00007fe72e9236d4 RCX: 000000000045c429 [ 2317.568142][T19421] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 2317.576104][T19421] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2317.584173][T19421] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2317.592147][T19421] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2317.610193][T19421] Mem-Info: [ 2317.614378][T19421] active_anon:169929 inactive_anon:231 isolated_anon:0 [ 2317.614378][T19421] active_file:2829 inactive_file:5215 isolated_file:0 [ 2317.614378][T19421] unevictable:0 dirty:73 writeback:0 unstable:0 [ 2317.614378][T19421] slab_reclaimable:17481 slab_unreclaimable:133001 [ 2317.614378][T19421] mapped:58312 shmem:303 pagetables:3130 bounce:0 [ 2317.614378][T19421] free:927381 free_pcp:171 free_cma:0 17:19:38 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe}) 17:19:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xb00}) [ 2317.840049][T19421] Node 0 active_anon:669520kB inactive_anon:920kB active_file:6528kB inactive_file:13968kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:223296kB dirty:264kB writeback:0kB shmem:1208kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 446464kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2318.064820][T19421] Node 0 DMA free:10436kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:68kB inactive_anon:0kB active_file:128kB inactive_file:324kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2318.226927][T19421] lowmem_reserve[]: 0 2557 2557 2557 2557 [ 2318.296017][T19421] Node 0 DMA32 free:194652kB min:36276kB low:45344kB high:54412kB reserved_highatomic:2048KB active_anon:667480kB inactive_anon:920kB active_file:6396kB inactive_file:12544kB unevictable:0kB writepending:260kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10508kB pagetables:12068kB bounce:0kB free_pcp:2088kB local_pcp:628kB free_cma:0kB 17:19:39 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x7000000}) 17:19:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xa}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:39 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xc00}) 17:19:39 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x10}) 17:19:39 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6000000}) 17:19:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xf}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2318.479975][T19421] lowmem_reserve[]: 0 0 0 0 0 17:19:39 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xd00}) [ 2318.510067][T19421] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 17:19:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x10}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2318.620326][T19421] lowmem_reserve[]: 0 0 0 0 0 [ 2318.639417][T19421] Node 0 DMA: 19*4kB (UME) 13*8kB (M) 25*16kB (UME) 23*32kB (UM) 6*64kB (UE) 5*128kB (UE) 4*256kB (UME) 4*512kB (UE) 2*1024kB (ME) 2*2048kB (UE) 0*4096kB = 11556kB [ 2318.811061][T19421] Node 0 DMA32: 641*4kB (UMEH) 299*8kB (UMEH) 116*16kB (UMEH) 154*32kB (UMH) 103*64kB (UMH) 5*128kB (UH) 22*256kB (UH) 41*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 45596kB [ 2318.930722][T19421] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2318.985585][T19421] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2319.039136][T19421] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2319.103046][T19421] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2319.160652][T19421] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2319.228748][T19421] 6862 total pagecache pages [ 2319.248890][T19421] 0 pages in swap cache [ 2319.273416][T19421] Swap cache stats: add 0, delete 0, find 0/0 [ 2319.292952][T19421] Free swap = 0kB [ 2319.305409][T19421] Total swap = 0kB [ 2319.410005][T19421] 1965979 pages RAM [ 2319.413856][T19421] 0 pages HighMem/MovableOnly [ 2319.418580][T19421] 339072 pages reserved [ 2319.436275][T19421] 0 pages cma reserved 17:19:40 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x40000}) 17:19:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xe00}) 17:19:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4a}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:40 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x7000000}) 17:19:40 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x8000000}) 17:19:40 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x11}) 17:19:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x60}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x1100}) 17:19:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x300}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x1200}) 17:19:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x532}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x2500}) 17:19:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x3205}) 17:19:41 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6000a0}) 17:19:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xa00}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:42 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x8000000}) 17:19:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x5c00}) 17:19:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xf00}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:42 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x1000000}) 17:19:42 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x9000000}) 17:19:42 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x12}) 17:19:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x6000a0}) 17:19:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3205}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:43 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x1000000}) 17:19:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4a00}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2321.977430][ T27] kauditd_printk_skb: 124 callbacks suppressed [ 2321.977438][ T27] audit: type=1325 audit(1582391983.171:52158): table=filter family=2 entries=4 17:19:43 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x2000000}) [ 2322.053052][ T27] audit: type=1325 audit(1582391983.171:52159): table=mangle family=2 entries=6 [ 2322.108345][ T27] audit: type=1325 audit(1582391983.171:52160): table=raw family=2 entries=3 [ 2322.175772][ T27] audit: type=1325 audit(1582391983.171:52161): table=security family=2 entries=4 17:19:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2322.227779][ T27] audit: type=1325 audit(1582391983.171:52162): table=filter family=10 entries=4 [ 2322.295298][ T27] audit: type=1325 audit(1582391983.171:52163): table=mangle family=10 entries=6 [ 2322.395658][ T27] audit: type=1325 audit(1582391983.201:52164): table=raw family=10 entries=3 [ 2322.449609][ T27] audit: type=1325 audit(1582391983.201:52165): table=security family=10 entries=4 [ 2322.516103][ T27] audit: type=1325 audit(1582391983.321:52166): table=filter family=10 entries=4 17:19:43 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x9000000}) 17:19:43 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x3000000}) 17:19:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x77a7}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2322.564015][ T27] audit: type=1325 audit(1582391983.321:52167): table=mangle family=10 entries=6 17:19:44 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x2000000}) 17:19:44 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa000000}) 17:19:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x25}) 17:19:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x4000000}) 17:19:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xa777}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:44 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xa000000}) 17:19:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x5000000}) 17:19:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x30000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6000a0}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x6000000}) 17:19:45 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x7000000}) 17:19:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1000000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:46 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x3000000}) 17:19:46 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x8000000}) 17:19:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5c}) 17:19:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2000000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:46 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb000000}) 17:19:46 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xb000000}) 17:19:46 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x9000000}) 17:19:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3000000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:46 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xa000000}) 17:19:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4000000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:46 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xb000000}) 17:19:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xa000000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:47 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x4000000}) 17:19:47 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xc000000}) 17:19:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xf000000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:47 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x300}) 17:19:48 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc000000}) 17:19:48 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xc000000}) 17:19:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xd000000}) 17:19:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x10000000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:48 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x5000000}) 17:19:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x32050000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xe000000}) [ 2327.035949][ T27] kauditd_printk_skb: 97 callbacks suppressed [ 2327.035956][ T27] audit: type=1325 audit(1582391988.231:52265): table=filter family=2 entries=4 [ 2327.097601][ T27] audit: type=1325 audit(1582391988.231:52266): table=nat family=2 entries=5 [ 2327.160153][ T27] audit: type=1325 audit(1582391988.231:52267): table=mangle family=2 entries=6 [ 2327.218938][ T27] audit: type=1325 audit(1582391988.231:52268): table=raw family=2 entries=3 17:19:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x10000000}) [ 2327.279509][ T27] audit: type=1325 audit(1582391988.231:52269): table=security family=2 entries=4 17:19:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4a000000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2327.356989][ T27] audit: type=1325 audit(1582391988.531:52270): table=filter family=3 entries=4 [ 2327.421792][ T27] audit: type=1325 audit(1582391988.601:52271): table=filter family=10 entries=4 [ 2327.478526][ T27] audit: type=1325 audit(1582391988.601:52272): table=mangle family=10 entries=6 17:19:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x11000000}) [ 2327.534955][ T27] audit: type=1325 audit(1582391988.601:52273): table=raw family=10 entries=3 17:19:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x60000000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2327.582091][ T27] audit: type=1325 audit(1582391988.611:52274): table=security family=10 entries=4 17:19:49 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x500}) 17:19:49 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x12000000}) 17:19:49 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd000000}) 17:19:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9effffff}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:49 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xd000000}) [ 2328.556045][T21321] warn_alloc: 16 callbacks suppressed [ 2328.556068][T21321] syz-executor.5: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz5,mems_allowed=0-1 [ 2328.590979][T21321] CPU: 1 PID: 21321 Comm: syz-executor.5 Not tainted 5.6.0-rc2-syzkaller #0 [ 2328.599657][T21321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2328.609721][T21321] Call Trace: [ 2328.613019][T21321] dump_stack+0x1fb/0x318 [ 2328.617387][T21321] warn_alloc+0x17d/0x2c0 [ 2328.621764][T21321] ? cpuset_nodemask_valid_mems_allowed+0x6a/0x80 [ 2328.628208][T21321] __alloc_pages_slowpath+0x25a4/0x25c0 [ 2328.633880][T21321] ? __next_zones_zonelist+0xb0/0x170 [ 2328.639312][T21321] __alloc_pages_nodemask+0x39a/0x5d0 [ 2328.644752][T21321] alloc_pages_current+0x2db/0x500 [ 2328.650043][T21321] ion_page_pool_alloc+0x4be/0x5e0 [ 2328.655182][T21321] ion_system_heap_allocate+0x210/0xb90 [ 2328.660791][T21321] ion_ioctl+0x45f/0x10a0 [ 2328.665189][T21321] ? debug_shrink_set+0x130/0x130 [ 2328.670272][T21321] __se_sys_ioctl+0x113/0x190 [ 2328.675088][T21321] __x64_sys_ioctl+0x7b/0x90 [ 2328.679691][T21321] do_syscall_64+0xf7/0x1c0 [ 2328.684186][T21321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2328.690097][T21321] RIP: 0033:0x45c429 [ 2328.693995][T21321] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2328.713594][T21321] RSP: 002b:00007f82c90d8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2328.722030][T21321] RAX: ffffffffffffffda RBX: 00007f82c90d96d4 RCX: 000000000045c429 [ 2328.730000][T21321] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 2328.737960][T21321] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2328.745919][T21321] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2328.753908][T21321] R13: 0000000000000365 R14: 00000000004c5922 R15: 000000000076bf2c [ 2328.820102][T21321] Mem-Info: [ 2328.826989][T21321] active_anon:169200 inactive_anon:231 isolated_anon:0 [ 2328.826989][T21321] active_file:2876 inactive_file:3723 isolated_file:0 [ 2328.826989][T21321] unevictable:0 dirty:104 writeback:0 unstable:0 [ 2328.826989][T21321] slab_reclaimable:17390 slab_unreclaimable:132896 [ 2328.826989][T21321] mapped:56904 shmem:303 pagetables:3104 bounce:0 [ 2328.826989][T21321] free:931799 free_pcp:391 free_cma:0 [ 2329.089357][T21321] Node 0 active_anon:667504kB inactive_anon:916kB active_file:6692kB inactive_file:6892kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:217564kB dirty:380kB writeback:0kB shmem:1204kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 446464kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2329.312292][T21321] Node 0 DMA free:10728kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:132kB inactive_anon:0kB active_file:128kB inactive_file:284kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2329.367021][T21321] lowmem_reserve[]: 0 2557 2557 2557 2557 17:19:50 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x6000000}) 17:19:50 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x25000000}) 17:19:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xa0006000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:50 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe000000}) [ 2329.564805][T21321] Node 0 DMA32 free:259000kB min:36276kB low:45344kB high:54412kB reserved_highatomic:2048KB active_anon:667368kB inactive_anon:916kB active_file:6540kB inactive_file:6548kB unevictable:0kB writepending:380kB present:3129332kB managed:2621444kB mlocked:0kB kernel_stack:10512kB pagetables:12084kB bounce:0kB free_pcp:880kB local_pcp:648kB free_cma:0kB 17:19:50 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x32050000}) [ 2329.660403][T21321] lowmem_reserve[]: 0 0 0 0 0 17:19:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xa7770000}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:50 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0xe000000}) [ 2329.685990][T21321] Node 0 Normal free:8kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:80kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2330.044408][T21321] lowmem_reserve[]: 0 0 0 0 0 [ 2330.105354][T21321] Node 0 DMA: 17*4kB (UM) 31*8kB (UME) 33*16kB (UME) 23*32kB (UM) 6*64kB (UE) 5*128kB (UE) 3*256kB (UME) 4*512kB (UE) 3*1024kB (UME) 1*2048kB (E) 0*4096kB = 10540kB [ 2330.171867][T21321] Node 0 DMA32: 181*4kB (UMEH) 62*8kB (MEH) 660*16kB (UEH) 970*32kB (UH) 9*64kB (UH) 1*128kB (H) 2*256kB (H) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 44036kB [ 2330.271571][T21321] Node 0 Normal: 0*4kB 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 2330.345985][T21321] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2330.394185][T21321] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2330.445880][T21321] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2330.524327][T21321] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2330.667137][T21321] 5272 total pagecache pages [ 2330.673890][T21321] 0 pages in swap cache [ 2330.687389][T21321] Swap cache stats: add 0, delete 0, find 0/0 [ 2330.698914][T21321] Free swap = 0kB [ 2330.730635][T21321] Total swap = 0kB [ 2330.734550][T21321] 1965979 pages RAM [ 2330.738365][T21321] 0 pages HighMem/MovableOnly [ 2330.754990][T21321] 339072 pages reserved [ 2330.759197][T21321] 0 pages cma reserved 17:19:52 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x10000000}) 17:19:52 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x600}) 17:19:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xefffffff}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:52 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x5c000000}) 17:19:52 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x7000000}) 17:19:52 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x10000000}) 17:19:52 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xa0006000}) 17:19:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xf0ffffff}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:52 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x11000000}) 17:19:52 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0xffffffff}) 17:19:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfcffffff}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:52 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)) 17:19:53 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x700}) 17:19:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffffff7f}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2332.046797][ T27] kauditd_printk_skb: 111 callbacks suppressed [ 2332.046804][ T27] audit: type=1325 audit(1582391993.241:52386): table=security family=10 entries=4 17:19:53 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x8000000}) 17:19:53 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2}) 17:19:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffffff9e}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2332.258904][ T27] audit: type=1325 audit(1582391993.451:52387): table=filter family=2 entries=4 [ 2332.281218][ T27] audit: type=1325 audit(1582391993.471:52388): table=nat family=2 entries=5 [ 2332.334629][ T27] audit: type=1325 audit(1582391993.471:52389): table=mangle family=2 entries=6 [ 2332.386885][ T27] audit: type=1325 audit(1582391993.471:52390): table=raw family=2 entries=3 [ 2332.460693][ T27] audit: type=1325 audit(1582391993.471:52391): table=security family=2 entries=4 [ 2332.524629][ T27] audit: type=1325 audit(1582391993.621:52392): table=filter family=10 entries=4 [ 2332.575736][ T27] audit: type=1325 audit(1582391993.631:52393): table=mangle family=10 entries=6 [ 2332.599943][ T27] audit: type=1325 audit(1582391993.631:52394): table=raw family=10 entries=3 [ 2332.633589][ T27] audit: type=1325 audit(1582391993.631:52395): table=security family=10 entries=4 17:19:54 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x11000000}) 17:19:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3}) 17:19:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffffffef}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:19:54 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x12000000}) 17:19:54 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x9000000}) 17:19:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184908, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}) 17:19:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffff0}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 2333.271455][T22031] BUG: unable to handle page fault for address: ffffed1019252707 [ 2333.279236][T22031] #PF: supervisor read access in kernel mode [ 2333.285236][T22031] #PF: error_code(0x0000) - not-present page [ 2333.291203][T22031] PGD 21ffef067 P4D 21ffef067 PUD 12fff6067 PMD 0 [ 2333.297747][T22031] Oops: 0000 [#1] PREEMPT SMP KASAN [ 2333.302939][T22031] CPU: 1 PID: 22031 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0 [ 2333.311597][T22031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2333.321697][T22031] RIP: 0010:ethnl_update_bitset32+0x1afe/0x2380 [ 2333.327946][T22031] Code: 24 30 44 89 fe 83 e6 1f 31 ff e8 fd c7 d4 fa 41 83 e7 1f 74 44 48 85 db 74 3f 48 8b 44 24 50 49 8d 1c 86 48 89 d8 48 c1 e8 03 <42> 8a 04 20 84 c0 0f 85 06 07 00 00 8b 1b 4c 89 f9 f6 d9 d3 e3 d3 [ 2333.347579][T22031] RSP: 0018:ffffc90001a976c0 EFLAGS: 00010a03 [ 2333.353685][T22031] RAX: 1ffff11019252707 RBX: ffff8880c929383c RCX: 0000000000000002 [ 2333.361690][T22031] RDX: dffffc0000000000 RSI: 0000000000000010 RDI: 0000000000000000 [ 2333.369660][T22031] RBP: ffffc90001a977b0 R08: ffffffff86a244c3 R09: ffffffff83bbaa67 [ 2333.377641][T22031] R10: ffff88801ea3a400 R11: 0000000000000004 R12: dffffc0000000000 [ 2333.385632][T22031] R13: ffffc90001a97ab0 R14: ffff8880a9293840 R15: 0000000000000010 [ 2333.393603][T22031] FS: 00007f597e298700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2333.402526][T22031] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2333.409114][T22031] CR2: ffffed1019252707 CR3: 00000001fefe8000 CR4: 00000000001406e0 [ 2333.417080][T22031] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2333.425063][T22031] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2333.433021][T22031] Call Trace: [ 2333.436337][T22031] ? memcpy+0x49/0x60 [ 2333.440351][T22031] ethnl_update_bitset+0x3c/0x50 [ 2333.445285][T22031] ethnl_set_linkmodes+0x5d4/0xf80 [ 2333.450441][T22031] genl_rcv_msg+0xf15/0x13e0 [ 2333.455052][T22031] netlink_rcv_skb+0x19e/0x3e0 [ 2333.459820][T22031] ? genl_unbind+0x250/0x250 [ 2333.464436][T22031] genl_rcv+0x28/0x40 [ 2333.468519][T22031] netlink_unicast+0x766/0x920 [ 2333.473312][T22031] netlink_sendmsg+0xa2b/0xd40 [ 2333.478099][T22031] ? netlink_getsockopt+0x9f0/0x9f0 [ 2333.483350][T22031] ____sys_sendmsg+0x4f7/0x7f0 [ 2333.488117][T22031] __sys_sendmsg+0x1ed/0x290 [ 2333.492750][T22031] ? __audit_syscall_entry+0x357/0x4e0 [ 2333.498228][T22031] ? syscall_trace_enter+0x621/0x8f0 [ 2333.503514][T22031] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2333.509235][T22031] ? do_syscall_64+0x1d/0x1c0 [ 2333.513958][T22031] __x64_sys_sendmsg+0x7f/0x90 [ 2333.518737][T22031] do_syscall_64+0xf7/0x1c0 [ 2333.523360][T22031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2333.529240][T22031] RIP: 0033:0x45c429 [ 2333.533129][T22031] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2333.552740][T22031] RSP: 002b:00007f597e297c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2333.561140][T22031] RAX: ffffffffffffffda RBX: 00007f597e2986d4 RCX: 000000000045c429 [ 2333.569132][T22031] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2333.577084][T22031] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2333.585039][T22031] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2333.592994][T22031] R13: 0000000000000904 R14: 00000000004d4f90 R15: 000000000076bf2c [ 2333.600982][T22031] Modules linked in: [ 2333.604870][T22031] CR2: ffffed1019252707 [ 2333.609014][T22031] ---[ end trace 829ca075a2ea7390 ]--- [ 2333.614482][T22031] RIP: 0010:ethnl_update_bitset32+0x1afe/0x2380 [ 2333.620722][T22031] Code: 24 30 44 89 fe 83 e6 1f 31 ff e8 fd c7 d4 fa 41 83 e7 1f 74 44 48 85 db 74 3f 48 8b 44 24 50 49 8d 1c 86 48 89 d8 48 c1 e8 03 <42> 8a 04 20 84 c0 0f 85 06 07 00 00 8b 1b 4c 89 f9 f6 d9 d3 e3 d3 [ 2333.640309][T22031] RSP: 0018:ffffc90001a976c0 EFLAGS: 00010a03 [ 2333.646401][T22031] RAX: 1ffff11019252707 RBX: ffff8880c929383c RCX: 0000000000000002 [ 2333.654382][T22031] RDX: dffffc0000000000 RSI: 0000000000000010 RDI: 0000000000000000 [ 2333.662339][T22031] RBP: ffffc90001a977b0 R08: ffffffff86a244c3 R09: ffffffff83bbaa67 [ 2333.670299][T22031] R10: ffff88801ea3a400 R11: 0000000000000004 R12: dffffc0000000000 [ 2333.678264][T22031] R13: ffffc90001a97ab0 R14: ffff8880a9293840 R15: 0000000000000010 [ 2333.686343][T22031] FS: 00007f597e298700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2333.695253][T22031] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2333.701871][T22031] CR2: ffffed1019252707 CR3: 00000001fefe8000 CR4: 00000000001406e0 [ 2333.709858][T22031] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2333.717822][T22031] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2333.725780][T22031] Kernel panic - not syncing: Fatal exception [ 2333.733026][T22031] Kernel Offset: disabled [ 2333.737345][T22031] Rebooting in 86400 seconds..