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"}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x9) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:14:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff}) setsockopt$inet6_udp_int(r2, 0x11, 0xc6159f1d1c16b45a, &(0x7f0000000440)=0x9, 0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) bind(r0, &(0x7f0000000340)=@ax25={0x3, {"8339877223b303"}, 0x6}, 0x80) r3 = memfd_create(&(0x7f0000000040)='/dev/net/tun\x00', 0x3) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000280)={{0x200}, 'port1\x00', 0x2, 0x8, 0x100000001, 0x1, 0x5c5, 0xa7, 0x1, 0x0, 0x5, 0x80000000}) execveat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='/dev/net/tun\x00'], &(0x7f0000000240)=[&(0x7f00000001c0)='mime_typeppp0:.trustedvmnet1\x00'], 0x1900) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:14:56 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) time(&(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000040)) 00:14:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) openat(r2, &(0x7f0000000100)='./file0\x00', 0x2040, 0x17b) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x503000) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000040)={0x8, 0x4, 0x4}) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:56 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xb}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000140)) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl(r3, 0x400000890f, &(0x7f0000000100)="00000000000000ff00000000") sendfile(r0, r2, &(0x7f0000000200), 0x80000005) 00:14:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x3, 0x1) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000100)={@broadcast, @local, @local}, &(0x7f0000000140)=0xc) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000040)) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080), &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:14:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080), &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:14:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xeb75, 0x1) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000080)) listen(r0, 0x2) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000000c0)) 00:14:56 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000000)={0x6, 0x4}) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:14:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x2040) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0xcc, r2, 0x800, 0x70bd2d, 0x25dfdbff, {0xd}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1f}, @IPVS_SVC_ATTR_AF={0x8, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x39}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x89}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x27}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3ff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r3 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:56 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x80000000) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:14:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clock_adjtime(0x7, &(0x7f00000001c0)={0x19d7, 0x200, 0x1, 0x7ff, 0x8, 0x7fff, 0x3, 0x5, 0x1, 0x1, 0x2, 0x5, 0x47b, 0x9, 0x7, 0x401, 0x1, 0x8001, 0x101, 0x7, 0x8, 0x6, 0x20, 0x20, 0x2, 0x3}) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080), &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:14:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0xfffffffffffffcfb) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:57 executing program 6: r0 = socket(0x10, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r3 = socket$inet6(0xa, 0x2, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, r2, &(0x7f0000000200), 0x80000005) 00:14:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x44c40, 0x0) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f00000001c0)={0x3, 0x0, 0x1}) r3 = getpid() ptrace$cont(0x18, r3, 0x6, 0x3) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', r4}, 0x65) 00:14:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r3) bind$unix(r1, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) shutdown(r0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x400, 0x0) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000140)) 00:14:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) fcntl$notify(r0, 0x402, 0x80000010) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:14:57 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getaffinity(r2, 0x8, &(0x7f0000000040)) close(r0) 00:14:57 executing program 0: clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{}, {}], 0x2, &(0x7f0000000080)={r0}, &(0x7f00000000c0), 0x8) shutdown(0xffffffffffffffff, 0x2) 00:14:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4, 0xfffffffffffffffc) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e23, 0x40, @mcast2={0xff, 0x2, [], 0x1}, 0x2d5}, {0xa, 0x4e23, 0x80000001, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, 0xdc9, [0x20, 0x73a, 0x4cd0, 0x1000, 0x8ee, 0x2, 0x583, 0xfffffffffffffffe]}, 0x5c) 00:14:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x6, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f00000000c0)="3eb59d456e4c18a5ebfd5929bb0ea79df5f5ea1e19ee28b317f9a3b10b36a7ce1699050fcf7313660c65e7822ef1f6404493e0db98164e9789306858f498b41417b17c50f488a690d7fcbcbd581aff12663b0dd8822b31d0a8ec1a7bf3febd9bcfb5a14bf96f6bec0f32d34db0a4bc167836478f8694eafa89f639ecf5f3582ffed0fd9e922d8d60e6bb39e694d6c1") socketpair(0x0, 0x0, 0x1000, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f00000001c0)={0x7fff, 0x100000001, 0x7d95, 0x0, 0x0, [], [], [], 0x4, 0x80000000}) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000300)={{0x2, 0x4e24, @loopback=0x7f000001}, {0x7, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 'veth0\x00'}) 00:14:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = dup2(r0, r1) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) renameat(r2, &(0x7f0000000000)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00') 00:14:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x3, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x2, @rand_addr=0x7f}, 'syzkaller0\x00'}) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x304d, 0x2a80) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)={r1}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:14:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0x9) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:57 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:14:58 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x6, 0x400100) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x90000001}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r3 = socket$inet6(0xa, 0x2, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, r2, &(0x7f0000000200), 0x80000005) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x20}, &(0x7f00000000c0)=0x8) pause() setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000100)={r4, 0x3, 0x8}, 0x8) 00:14:58 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x1ff, &(0x7f0000000100)="295ee0313eac44e1210dccb5e1ed12e21657fa836a7856b4b56f8afc9ee1ae4d5ed606d3103cc31159baad8163d02f9c27f3fe8069ca24326b0af66efc7102dce20dee0497fb24db40ef82160087b86ee89699f614b3ed5efb") r1 = socket$inet(0x2, 0x3, 0x9) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) 00:14:58 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x1) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='\x00'}, 0x10) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f00000001c0)={0x1ff, 0x200}) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000040)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0xa) sendto$inet(r3, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:58 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000180)=0x8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x8) setsockopt$packet_int(r3, 0x107, 0xe, &(0x7f0000000080)=0xa00000000000000, 0x4) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:14:58 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0xa00, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x10000, 0x7, 0x3}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:14:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) socketpair(0x15, 0x80005, 0x80000000, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {r0, 0x8404}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) ioctl$TTUNGETFILTER(r3, 0x801054db, &(0x7f0000000240)=""/133) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x50000, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1a0, 0x43ffd) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0xfffffffffffffeb3) shutdown(r0, 0x0) 00:14:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002840)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000002c40)={0x0, 0x400}, &(0x7f0000002c80)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002f00)=[{&(0x7f0000002880)=@in={0x2, 0x4e21}, 0x10, &(0x7f0000002bc0)=[{&(0x7f00000028c0)="2f5dc4ff0f5847196879eefe5670b030d447e8854702ad3b387ef4ffc092aaa0cf95df63033d6813ee244d701f1d7f7f2d25e69c4b7a500998244b6b8d39b23d60f3c0b924c7323959fd9b14009d81aea5a18b6218a8a90a43b24d03c3f21e4c0957ba457a2dff5b92248a3fafb72cc5e96a5616d7491290f31ab18ca4", 0x7d}, {&(0x7f0000002940)="99d266ad36ade7cab50d2ddd8f7e8a876f93532899b9c56368fb7f919324af42acd15d668d38d87eb8f85c15ff2a9a35fbde68d372c29994b1bca1094e993a359f1c264c207054e4ccfa2987af62e2aec53ded38f4ad9af7", 0x58}, {&(0x7f00000029c0)="3de60b9673af6c0d24cc529d0c0e5aea03d9a081eda7cbe9eed85344e329790a6fe580947c8214e023a3a39a3e0505b0822ca6123fe436261d80af2ccc897f46dfc93f97941cee8852960442b9b72af4c8bdaa9d0500f6b87480dcbd2cf877ba8b1a425a3e366ea8e03ddf40fc8687b1673be4709c082651c7ff26a1a7f523309a412ff4dc3698fc3d2bbcca719c42bf57c9ff8014e7a7f29a2eb7023786195aa48ac64c873a58f7", 0xa8}, {&(0x7f0000002a80)="4231533d114d8eea662def8cc705be75e009fa", 0x13}, {&(0x7f0000002ac0)="7124a513d60e101b5a8edc1fd2a6ba57c02a7e6291c342703a314322c71e6c547a4f18b48802846d29dcdf036fbba9f35f875e0fdfe3dee07babfe71ca545c77ac86b21d87b4f4ce70635945e7a40262752ccb9dd1bdc494769af7f2b860888cea12a92dc29cce9af72f9e7f72b874", 0x6f}, {&(0x7f0000002b40)="c6f67cf9f9a0f11e2c", 0x9}, {&(0x7f0000002b80)="efdac0eeeae2629cc15adf557e1a73c4790a525e81a21981e6f1e5f4ecb28f78f5e5", 0x22}], 0x7, &(0x7f0000002cc0)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0xccd7}}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x8a0, 0x20b, 0x10001, 0x2, 0x8, 0x87ad, 0x3, r2}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1=0xe0000001}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2=0xe0000002}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x1c}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x5}}], 0xa8, 0x40000}, {&(0x7f0000002d80)=@in6={0xa, 0x4e20, 0x2500, @loopback={0x0, 0x1}, 0x5}, 0x1c, &(0x7f0000002e80)=[{&(0x7f0000002dc0)="b1fd090e2e4254af0f4bc7f577be50c779ff78058fc76bb5c86ed87ff3b64d824b9c0e101302a3377cb14629e1ab5894096aa4891531a70e24872199fc120b4a0cfee207c0f04d136995f2dc282fca361980e9ff12d4c8f897ad02cba26119076930de13148fb72f99bc186b4d9177d3a7bb187192c47e6f201c43b6", 0x7c}, {&(0x7f0000002e40)="5e71c0fb9c68adb0f5965ef219b9042d85033f5cb6adf4a76103e62dee772c91f7", 0x21}], 0x2, &(0x7f0000002ec0)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast1={0xff, 0x1, [], 0x1}}], 0x20, 0x40000}], 0x2, 0x20040000) r3 = socket$inet(0x2, 0xa, 0x9a8) unshare(0x100) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x72f) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:58 executing program 4: r0 = socket$inet6(0xa, 0xa, 0xc) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000500)=@filter={'filter\x00', 0xe, 0x2, 0x428, [0x0, 0x200000c0, 0x200000f0, 0x200002e8], 0x0, &(0x7f0000000040), &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x501) r3 = geteuid() ioctl$TUNSETOWNER(r2, 0x400454cc, r3) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:14:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x307, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkalmer0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:14:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) bind$rds(r2, &(0x7f0000000100)={0x2, 0x4e24, @broadcast=0xffffffff}, 0x10) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = dup2(r1, r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) connect$can_bcm(r3, &(0x7f0000000040)={0x1d, r4}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000001c0)={{{@in, @in6}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:58 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1000, 0x40000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000000c0)={0x1, [0x27]}, &(0x7f0000000100)=0x6) close(r0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x7}, {0x400, 0xd1}, {0xc5a, 0x2}, {0x5, 0x9}]}) 00:14:58 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:14:58 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10001, 0x840) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140)=0x2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r2}, {r1}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r2, 0x80000) clock_gettime(0x0, &(0x7f00000080c0)={0x0, 0x0}) fchdir(r1) recvmmsg(r2, &(0x7f0000007e80)=[{{&(0x7f00000001c0)=@nl, 0x80, &(0x7f0000000600)=[{&(0x7f0000000240)=""/64, 0x40}, {&(0x7f0000000280)=""/178, 0xb2}, {&(0x7f0000000340)=""/42, 0x2a}, {&(0x7f0000000380)=""/125, 0x7d}, {&(0x7f0000000400)=""/93, 0x5d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f00000004c0)=""/100, 0x64}, {&(0x7f0000000540)=""/143, 0x8f}], 0x8, &(0x7f0000000680)=""/65, 0x41, 0xff}, 0x3}, {{&(0x7f0000000700)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000780)=""/96, 0x60}], 0x1, &(0x7f0000000840)=""/221, 0xdd, 0x6}, 0x7f}, {{&(0x7f0000000940)=@sco, 0x80, &(0x7f0000001b80)=[{&(0x7f00000009c0)=""/178, 0xb2}, {&(0x7f0000000a80)=""/71, 0x47}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/119, 0x77}], 0x4, &(0x7f0000001bc0)=""/113, 0x71, 0x4}, 0x8}, {{&(0x7f0000001c40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000003140)=[{&(0x7f0000001cc0)=""/203, 0xcb}, {&(0x7f0000001dc0)=""/69, 0x45}, {&(0x7f0000001e40)=""/50, 0x32}, {&(0x7f0000001e80)=""/141, 0x8d}, {&(0x7f0000001f40)=""/210, 0xd2}, {&(0x7f0000002040)=""/193, 0xc1}, {&(0x7f0000002140)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0x6}, 0x10000}, {{&(0x7f00000031c0)=@nl, 0x80, &(0x7f0000003680)=[{&(0x7f0000003240)=""/219, 0xdb}, {&(0x7f0000003340)=""/188, 0xbc}, {&(0x7f0000003400)=""/105, 0x69}, {&(0x7f0000003480)=""/30, 0x1e}, {&(0x7f00000034c0)=""/66, 0x42}, {&(0x7f0000003540)=""/7, 0x7}, {&(0x7f0000003580)=""/26, 0x1a}, {&(0x7f00000035c0)=""/140, 0x8c}], 0x8, &(0x7f0000003700)=""/102, 0x66, 0x10000}, 0xd530}, {{&(0x7f0000003780)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005c40)=[{&(0x7f0000003800)=""/38, 0x26}, {&(0x7f0000003840)=""/155, 0x9b}, {&(0x7f0000003900)=""/222, 0xde}, {&(0x7f0000003a00)=""/194, 0xc2}, {&(0x7f0000003b00)=""/4096, 0x1000}, {&(0x7f0000004b00)=""/14, 0xe}, {&(0x7f0000004b40)=""/254, 0xfe}, {&(0x7f0000004c40)=""/4096, 0x1000}], 0x8, &(0x7f0000005cc0)=""/5, 0x5, 0x5}, 0x200}, {{&(0x7f0000005d00)=@can, 0x80, &(0x7f00000062c0)=[{&(0x7f0000005d80)=""/197, 0xc5}, {&(0x7f0000005e80)=""/192, 0xc0}, {&(0x7f0000005f40)}, {&(0x7f0000005f80)=""/164, 0xa4}, {&(0x7f0000006040)=""/145, 0x91}, {&(0x7f0000006100)=""/169, 0xa9}, {&(0x7f00000061c0)=""/213, 0xd5}], 0x7, &(0x7f0000006340)=""/84, 0x54, 0x7fffffff}, 0x10000}, {{&(0x7f00000063c0)=@xdp, 0x80, &(0x7f0000006800)=[{&(0x7f0000006440)=""/254, 0xfe}, {&(0x7f0000006540)=""/101, 0x65}, {&(0x7f00000065c0)=""/43, 0x2b}, {&(0x7f0000006600)=""/14, 0xe}, {&(0x7f0000006640)=""/130, 0x82}, {&(0x7f0000006700)=""/73, 0x49}, {&(0x7f0000006780)=""/120, 0x78}], 0x7, &(0x7f0000006880)=""/86, 0x56, 0xfffffffffffffff8}, 0xffffffff91708e55}, {{0x0, 0x0, &(0x7f0000006e00)=[{&(0x7f0000006900)=""/206, 0xce}, {&(0x7f0000006a00)=""/65, 0x41}, {&(0x7f0000006a80)=""/42, 0x2a}, {&(0x7f0000006ac0)=""/252, 0xfc}, {&(0x7f0000006bc0)=""/25, 0x19}, {&(0x7f0000006c00)=""/244, 0xf4}, {&(0x7f0000006d00)=""/253, 0xfd}], 0x7, &(0x7f0000006e80)=""/4096, 0x1000}, 0x8}], 0x9, 0x20, &(0x7f0000008100)={r4, r5+10000000}) 00:14:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f00000001c0)={'raw\x00', 0xd, "bf27ebc1240a8a93992af87740"}, &(0x7f0000000200)=0x31) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e29, @broadcast=0xffffffff}, 0x10) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x93a, 0x200) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000140)=0x2, 0x4) close(r1) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f00000000c0)) 00:14:59 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xb1, 0x80000) connect$bt_rfcomm(r2, &(0x7f0000000340)={0x1f, {0x39, 0x9cf, 0x0, 0x7, 0x1ff, 0x3ff}, 0x615}, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000300)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) close(r0) 00:14:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) r2 = syz_open_dev$dmmidi(&(0x7f00000027c0)='/dev/dmmidi#\x00', 0xfffffffffffffffb, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000002800)=0xfffffffffffffffd, 0x4) 00:14:59 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r2 = socket$inet6(0xa, 0x200000000002, 0x7a97635a) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0xa0, &(0x7f00000000c0)=[@in={0x2, 0x9, @broadcast=0xffffffff}, @in={0x2, 0x4e20, @rand_addr=0x7}, @in6={0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}}, @in6={0xa, 0x4e21, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in6={0xa, 0x4e24, 0x36, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in6={0xa, 0x4e21, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0xf69}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={r3, 0x58, &(0x7f0000000240)=[@in={0x2, 0x4e22, @broadcast=0xffffffff}, @in6={0xa, 0x4e20, 0xec46, @local={0xfe, 0x80, [], 0xaa}, 0x8314}, @in={0x2, 0x4e22, @rand_addr=0xdc4f}, @in6={0xa, 0x4e21, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x7f}]}, &(0x7f00000002c0)=0x10) sendfile(r0, r1, &(0x7f0000000200), 0x80000005) 00:14:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x100000000, 0x0, 0x10000, 0x5fa}, 0x14) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000001c0)={0xffffffff, {{0x2, 0x4e24, @rand_addr=0x3ff}}, 0x1, 0x7, [{{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e24}}, {{0x2, 0x4e24, @multicast2=0xe0000002}}, {{0x2, 0x4e21, @rand_addr=0x7db}}, {{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e24, @broadcast=0xffffffff}}, {{0x2, 0x4e20, @rand_addr=0x3}}]}, 0x410) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x400000) r3 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x40400) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getpeername$packet(r2, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0x14) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000840)) getsockname$packet(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000006c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000700)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001f00)={'bcsh0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001f40)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000002040)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000002240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000002200)={&(0x7f0000000880)=ANY=[@ANYBLOB="64010000", @ANYRES16=r4, @ANYBLOB="080428bd7000fddbdf250300000008000100", @ANYRES32=r5, @ANYBLOB="840002004000ba0024ef00660c72696f72697479000008070000000040000000000000000000eb419f05e4a99f589e5ff6322d9b000000000000080003000e000000082aa20d10fd40c8ed000800", @ANYRES32=r6, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ff03000008000600", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="bc00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000008040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r9, @ANYBLOB="080007000000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f616463617374000000"], 0x164}, 0x1, 0x0, 0x0, 0x41}, 0x20000044) 00:14:59 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@ethernet={0x0, @remote}, &(0x7f0000000080)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x1f, 0x7, 0x7, 0xfffffffffffffff7, 0x4, 0x49e, 0x3f, {0x0, @in6={{0xa, 0x4e22, 0x1000, @local={0xfe, 0x80, [], 0xaa}, 0x80}}, 0xe4c5, 0x8, 0x31, 0x7, 0x40}}, &(0x7f0000000280)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000002c0)=r1, 0x4) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000300)) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x9, &(0x7f0000000100)="291ee1311f16f477671070") r3 = socket$inet(0x2, 0x3, 0x9) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x5}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000000c0)={r4, 0x8f90ef3, 0x7}, 0x8) 00:14:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2080, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f00000000c0)=0x54) 00:14:59 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x6, 0x3, 0x26, 0x8, 0x4, 0x101, 0x7fffffff, 0xfffffffffffffffa, 0xd6d6, 0x2}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdfd, 0x0, 0x0, 0x0, 0x4}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:14:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x84000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={r3, 0x4}, &(0x7f0000000300)=0x8) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000440)={{&(0x7f0000000340)=""/150, 0x96}, &(0x7f0000000400), 0x1}, 0x20) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) ptrace$peek(0x2, r4, &(0x7f00000001c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) prctl$setptracer(0x59616d61, r5) r6 = syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0xffffffffffffffff, 0x101000) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f00000004c0)) 00:14:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x402, 0x0) r3 = socket$inet(0x2, 0x8080f, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0x8, 0x81, 0x7, 0x3f}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000280)={r4, 0x6120}, &(0x7f00000002c0)=0x8) ppoll(&(0x7f00000000c0)=[{r1, 0x12}], 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)={0x8001}, 0x8) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000040)=0x5) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:14:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x10}, 0x8000, 0x3, 0x3, 0x2, 0x5, 0x3, 0x8b71}, &(0x7f0000000040)=0x20) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x2, 0x8) recvfrom$inet(r1, &(0x7f00000000c0)=""/7, 0x7, 0x40002001, &(0x7f0000000140)={0x2, 0x4e22}, 0x10) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/225) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:14:59 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x100, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:14:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x3fc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) r2 = getpid() tgkill(r1, r2, 0x41) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") fcntl$getown(r0, 0x9) r3 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ptrace$getregs(0xe, r1, 0x10001, &(0x7f00000001c0)=""/157) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) 00:14:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x1, {0x2, 0x4e22, @broadcast=0xffffffff}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, {0x2, 0x4e23, @rand_addr=0x10001}, 0x388, 0x40, 0xfffffffffffffff9, 0x1, 0x4, &(0x7f0000000080)='ip6gre0\x00', 0x4, 0x8, 0x3}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) finit_module(r0, &(0x7f0000000040)='-^vmnet1ppp0ppp1*vmnet1\\mime_typetrusted\x00', 0x1) 00:14:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000000080)={r1}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x8400) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)) 00:15:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f00000002c0)="0016f47767107000000000") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x400000) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000040)) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x0, 0x7ff, 0x7, 0x2ab, 0x10001, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e22, @loopback=0x7f000001}}, 0x81, 0x67, 0x1, 0x7, 0x2}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000003c0)={r3, 0x7}, &(0x7f0000000400)=0x8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f0000000100)='./file0\x00', r4, r5, 0x400) 00:15:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) write$binfmt_elf64(r1, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0xbdc0, 0x9, 0x5, 0x8000, 0x8, 0x3, 0x3, 0x5, 0x30e, 0x40, 0x16e, 0x5, 0x9, 0x38, 0x2, 0x884f, 0x95, 0x8}, [{0x6474e551, 0x100000000, 0x8, 0x9, 0x1, 0x7, 0x3, 0x8}], "c91f4f9fbb3e407c981c94685e09d9cb3fc62cef46553f49c135acf03ef0dd56fb35289dfb602a7daf0741d25eb63ce8585292d74f1db1b54176f2a78f792a8034a3afdbdda0aa00ee0fa6b39c8a037bc44eb98c0a890f4702088642181dbbf4", [[], [], [], [], [], [], []]}, 0x7d8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2100, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)) fcntl$setpipe(r1, 0x407, 0x80) 00:15:00 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x204) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:00 executing program 6: r0 = socket(0x10, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x7f, "fdebbdd45ac3a42e5b35bd63c321c51b505137bade439c733458ee6d3d55c3be67f483071be20bbec9e355d79156c4b8ea75e54a6f28ab2917fad70cb97e31c5be255fdd325b4b688b694d769d81f6d68c8b19e6f4bdf921980bfaf973149650b967d022a99b447c628c4d04c6eab9126bcb0ac6f938b6d7a9266679195cc0"}, &(0x7f0000000040)=0x87) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000180)={r1, 0x0, 0x81}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000300)=0x2, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, r2, &(0x7f0000000200), 0x80000005) getsockopt$inet_tcp_buf(r2, 0x6, 0x1e, &(0x7f0000000240)=""/146, &(0x7f00000001c0)=0x92) 00:15:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) ptrace$getregs(0xad7c7a809cea1260, r2, 0x0, &(0x7f0000000080)=""/73) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4000000000000001, 0xfffffffffffffffd) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r3, 0x4}}, 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000100)) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0xfdec) ioctl$void(r1, 0xc0045c78) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f00000001c0)="270fcc12ae4f60f0000314d7d4a547067c012935d627b737194b8043282d7407596d55f5ff94dc44af0b0fd3575e04e4943c4f182c84b99cb8778a72f517f0c42bda62e647c39053dfd88655ae16"}, 0x10) ioctl$PPPOEIOCSFWD(r4, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'ipddp0\x00'}}) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000140)="295ee1311f16f477671070458894dc0484fb76a60a6e3ff5060c068891d06d71a3e0971f77b2c51d288f05d21891895f121cda682e71b373116719dd59b4b82a309204a7c0f2799644000000000000000000000000000000000000") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r2) 00:15:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) dup(r0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r2, 0x6, 0x1, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000100)=0x1, 0x4) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) socket$inet6(0xa, 0x80f, 0x100000000) 00:15:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000006c0)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0xfac9, 0x2, 0x2, 0xffffffff, 0x6}, &(0x7f0000000780)=0x98) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000007c0)=r2, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000800)={0x51, 0x8, 0x93a, {0x6, 0x8}, {0x0, 0x8}, @const={0x100, {0x0, 0x0, 0x0, 0x9}}}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000840)=0xffffffffffffff5b, 0x4) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x19) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_netfilter(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x3dc, 0x4, 0x0, 0x108, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x9}, [@typed={0x8, 0x54, @fd=r0}, @typed={0x14, 0x4b, @ipv6=@dev={0xfe, 0x80, [], 0xb}}, @generic="84a75c19fc92d089ff287d04c1f1c51780bf26e7d58fdd3654ed3ca5d1bfa79bd947ce5f602bddaa0fb2a575d98ef422a57f1de4b4f0b872affc64dbc769eb0f8c3e09f5b58113417c412a504c7c16b287b85a64cc28dc2341f4ec9c8c5f1a1f126b34d06f66cca4887d44c4f188cb37f17790e883bbf6fe18f4a8f5", @nested={0x40, 0x28, [@generic="dac2fe34958a5de9f9aab3d46a8d79b0fa8740e8cef3", @generic="8fc93f6b2444ccdeac76036b1567caf78009d4ac4c3a8bc73d978e47ae8517d4c70c8c19"]}, @typed={0x8, 0x90, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @generic="fad616f868854460d4642ad51e114be2143267dbfef9b0024f0ca92e5eb92cd4e8c38e243b1de13c43d001059ed0", @generic="2ed5ed4984660fadf306e48d94dee1c95b0ea49b7b55d4c63f8624def6861c6a12df76da51c1fe9a1b58d639efe97288bf7a18313a217d138459e0ae89c378fac4869e8e7b2695d18f9e5a83a0d32779b76f08df578ccb69391d5f2a651278b85d79a3fc816a4771eec6c23641d649847f51b28ef9198fd6b11ae687601335269cf756135402fd88e544d0bd386d7f", @generic="a5627166da069c601bdc4dee3dd9833a2919a4c199df8ecbfea78b81d5bb6a14ec0dc96e52d8d46f7697da9a61c04de621d4a0266127c0f6166b8596651519e753013de563a0e7e2f4b5b35e3831aedf41e757b23440598fb82efd36870e6f5bdb1830c3", @generic="38d7af75a134bae48df45302c34e68aab1fca6f322489f66d0405aff7764e782a60beef7a9e06176aa5a5b3654ddccc3d0c17ab72dcb63263e15487778fa556a51914b3090d1b06fbf3793f1325907e8c3554f82ddbc9c34acba9194d35d08daadf9d707482f4176494092", @nested={0x15c, 0x0, [@generic="a7ed42ad6d5d0f89a5a9e5ab2e5c9eabbe05b0400e092ce03119db8cb0c9c35167d84f4f2fdf4977777488fb77e6dfb3912b521977cd640548a2a5ac164c5a98ad366beee51db9f7b5a52ad0e0909546b217c95c3aae88512b4a4409dc20ed94cf56de51a9c94ea1983e488542ca", @generic="61d57c6d529ead09ec05186dbb975139742827831f3822c6514edb801fe40e6f74c8d74e3e796d213e8f91da2edec901e5f7f26081bdc8e9552b7f35d973885072a8be3b493c25a4b7786f12dfa0962942f699efd3c69942feca013d0ef87ac707ff99b04b780479953f94fa54752d752a09ee6226bac06ceb7222f63ef8a481510ebf3a8eb6e9128b4f1be5bbe8b34548564e0ad9fdc88f4c3f04c7a89b5009c34619e65c4782", @generic="fedd687d1bbe425f90ee98cda5daf5a07a1a2cef5822f776aad3d0b271f02ee491dace", @typed={0x8, 0x48, @str='\x00'}, @typed={0x8, 0x8c, @uid=r4}, @typed={0x10, 0x52, @str='keyringGPL\x00'}]}]}, 0x3dc}, 0x1}, 0x4000) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000240)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x3}, 0x8) r4 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000340)={{0x6, 0x5, 0x6, 0x0, '\x00', 0x2}, 0x0, 0x10000008, 0x10001, r4, 0x8, 0x2, 'syz0\x00', &(0x7f0000000080)=["000000000000eb0000000000001000", ')-\\nodev\x00', 'em1ppp0\x00', 'selinux\x00', 'syzkaller0\x00', '/dev/net/tun\x00', '*user\x00', '/dev/net/tun\x00'], 0x53, [], [0x3, 0x1, 0x3, 0x2]}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:00 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x40000000000000, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x0, 0x40}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) ppoll(&(0x7f0000000000)=[{r0, 0x500}, {r1}, {r1}, {r0, 0x4411}], 0x4, &(0x7f0000000040), &(0x7f0000000080)={0x4}, 0x8) close(r0) 00:15:00 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x5, &(0x7f0000000040)="295ee1311f16f477671070") sendfile(r0, r1, &(0x7f0000000200), 0x80000005) 00:15:00 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)={'#! ', './file0', [{0x20, "cd5d"}, {0x20, '@]]self[eth0\\:'}, {0x20, "ce"}, {0x20}, {0x20, 'eth1vmnet1wlan1'}, {0x20}, {0x20, 'vmnet0vboxnet0$nodev!!'}], 0xa, "74a45cf7d9bb64b8a5ac3b"}, 0x53) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r0 = socket$inet(0x2, 0x3, 0x9) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) read(r0, &(0x7f0000000000)=""/127, 0x7f) 00:15:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000000080)={r1}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x604006) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000140)={'teql0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x41) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:01 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r1) ioctl$TCFLSH(r0, 0x540b, 0x9) 00:15:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x397) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40000, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x20001) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:01 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x44980, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000000c0)=""/162) r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') socket$inet6(0xa, 0x2, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x4, 0x80000005) 00:15:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x68, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, @in6={0xa, 0x4e21, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x2}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, @in={0x2, 0x4e22}, @in6={0xa, 0x4e23, 0xd57, @remote={0xfe, 0x80, [], 0xbb}, 0xfffffffffffff1a3}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r1, 0x7fffffff, 0x38}, &(0x7f0000000240)=0x10) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x2, 0x0) write$cgroup_type(r2, &(0x7f00000002c0)='threaded\x00', 0x9) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e24, @multicast1=0xe0000001}, 0xfffffffffffffe41) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r3 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2040, 0x10) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000040)) socket$inet(0x2, 0x5, 0xffffffff00000000) 00:15:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r1}) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000040)) getpeername$unix(r2, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x8, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) unshare(0x40040000) 00:15:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @loopback=0x7f000001}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x22a6, &(0x7f00000000c0)="295ee1311007") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:01 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0x8) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000000)="667124b4d3504c01aa5b014e120be3e4ca35be5afc1d41d9c8d3e3403cf3034b0a679a692b1d2b029fd92012636a9fdfa62a5070bd739a62b48de047ccc7b67ad2bdd535fbd2dc97e44c303ca1eaa26e7c2dc0076f893f5cc77ef17554d617873fab6c73f15139d491acc19bd459730427997cc8002a489c0dd34f8db57aa842b4b2ab88249e832d0ffc5911d11e76e0a641164055eea3b035eb73934de0e35c6698511d211971972f4479fbffdac9b13362a2d36fd0e844d1045be14463ca0bde518e2e457a8e871b6d93ac6d817d732e5790753ad5f5504a2d794048823e94f9adec60b5afc7c1c876ce6e200642a646c5ec4b23f788bebb46b4e2bc4ca43e") ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) ioctl$TCXONC(r1, 0x540a, 0xf3c) membarrier(0x41, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x7, 0x200) connect$pptp(r2, &(0x7f0000000140)={0x18, 0x2, {0x0, @loopback=0x7f000001}}, 0x1e) 00:15:01 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r2 = socket$inet6(0xa, 0x4, 0x8) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, r1, &(0x7f0000000200), 0x80000005) [ 427.396567] IPVS: ftp: loaded support on port[0] = 21 00:15:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e24, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40880) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000000c0)) r2 = socket$inet(0x2, 0x3, 0x9) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000000080)={r1}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:01 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000040)={0xffffffffffffffff, 0x1, 0x9da6, 0x3, 0x8000}) close(r0) 00:15:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x1) open$dir(&(0x7f0000000580)='./file0\x00', 0x0, 0x82) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) chown(&(0x7f0000000140)='./file0\x00', r4, r5) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f00000001c0)={0x1, 0x7, 0x0, [{0x101, 0x7, 0x3, 0x4, 0x80, 0x5, 0x1}, {0x3, 0x2, 0x7, 0x0, 0x5, 0x1000, 0x7}, {0xe83, 0x81, 0xfff, 0x7, 0x6, 0x8, 0x40}, {0x401, 0x4, 0x0, 0x2, 0x1ff, 0x5, 0x3f}, {0xff, 0x9, 0x6, 0x10000, 0x80000000, 0x10000000000}, {0xffff, 0x9, 0x5, 0xb193, 0x700000000000, 0x1, 0x4}, {0x3, 0xffff, 0x7, 0x4, 0x3, 0x4, 0x4b75}]}) shutdown(r3, 0x0) 00:15:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x800, 0x4200) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:02 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x4000, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295fe1311f16f477671070") r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x7) r5 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(r3, 0x0) r6 = semget$private(0x0, 0x2, 0x200) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f00000003c0)={{0xec, r3, r4, r3, r4, 0x0, 0x8}, 0x5c, 0x0, 0x1000}) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000001c0)=0x5, 0x4) ioctl$sock_inet_SIOCSARP(r7, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x48, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 'teql0\x00'}) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r7, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @multicast1=0xe0000001}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xd}}, 0x8, {0x2, 0x0, @rand_addr}, "73797ae7ffffffffffffff008341d72f"}) fstatfs(r0, &(0x7f0000000240)=""/6) readv(r5, &(0x7f0000000380)=[{&(0x7f0000000280)=""/194, 0xc2}, {&(0x7f0000000680)=""/4096, 0x1000}], 0x2) pause() ioctl$sock_inet_SIOCSARP(r7, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) r9 = msgget$private(0x0, 0x20) msgctl$IPC_INFO(r9, 0x3, &(0x7f0000000440)=""/25) 00:15:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x3, 'bond0\x00', 0x4}, 0x18) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7fff, 0x400) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xcd8a, 0xff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r3, 0x5, 0x86}, 0xc) 00:15:02 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffa87, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3262, 0x4903) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f0000000040)={0x5, 0x0, 0x3, 0x8, 'syz0\x00', 0x2d2}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:02 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r2 = socket$inet6(0xa, 0x2, 0x0) recvmsg(r2, &(0x7f0000000180)={&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)}], 0x1, &(0x7f0000000240)=""/130, 0x82, 0x13df}, 0x2040) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000300)=""/236) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000400)=""/129) sendfile(r0, r1, &(0x7f0000000200), 0x80000005) 00:15:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x8000, 0x6, 0x3f, 0x242}, {0x3, 0x7f, 0x20, 0x9}, {0x7, 0x3, 0x247, 0xcd5}]}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8, &(0x7f0000000300)="290136867a9700000039167f27a34303fab0590e03f779a43c83b59dab81d11a93be57198ef15527b943a77d5d9c117267117032f0d4c77a96bf6aa023edcf2ab6d265b0eb05e0288a6adeb2846e86751e3edb9d2ed519998b62bc35015fbdbcb1c18d6234a55242f5469af6d9725c329bb348c05b7f43fcc00596b8e7dff6b42873453e6f9f9c5aa5ce34dae11ce1959b498009924413cda52b8f9a3bbd056fffa3c92dce96fde27104b496efe444dab5aacfa8105b22cbafede7f71b63452831") r1 = socket$inet(0x2, 0x3, 0x9) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000040)=0x2, &(0x7f00000000c0)=0x2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00007d9fc8)={&(0x7f000087fff4)={0x10}, 0xc, &(0x7f0000a40000)={&(0x7f0000b9e000)=ANY=[@ANYBLOB="ac000000210011040000000000000000e0000001000000000000000000000000ff01000000000000000000000000000100000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000009e0000005c00110000000000ff0f00000000000000000001e0000002000000000000000000000000000000000000000000000000ff010000000000000000000000000001ff020000e3ffffffffffffff00000001000000000000000000000000"], 0xac}, 0x1}, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x803, 0xffffffffffffff83) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:02 executing program 7: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @multicast1}, &(0x7f0000000180)=0x10) write(r0, &(0x7f00000001c0)="f14b73a5b2d10cf87a897b5e3b995cde64fdcb35b7ad0a790c0959ddd16bad6a1c84e55d", 0x24) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)={0x0, 0x2}) syz_open_pts(r1, 0x404000) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000280)=0xe) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000040)=""/205) ioctl$TCXONC(r1, 0x540a, 0x3) close(r2) 00:15:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x48000, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x20000, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000200)) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000240)=""/242) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000680)="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") ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x8000f, 0xc908) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x1, 'client0\x00', 0x43c19767f423be3c, "471d5afb5011eb7e", "518b63fe805ffa3db908d1960075f219ebdc8d601be40910c90b2a0753028068"}) 00:15:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x9}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0x9, 0x1ff}, 0x8) r2 = socket$inet(0x2, 0x3, 0x9) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 00:15:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) readv(r0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/151, 0x97}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000000)=""/13, 0xd}], 0x3) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:03 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000700)=ANY=[@ANYBLOB="71161eaf07fc10022c9669db9a31e374b53198990353819e6fbcdefe38c42a6e01825ee00c6c94c6cf95e80426b790657b515b1abf4b1021d66a2fc6d2b6c3ffd060bf8eb81944ab8b5d93da87b655e978cd6e1f5438a4813916d79b41c94add268fe8e94770848d6723a1169d9b7f309976e1d5332f8caaaafbef0d7e31ee233d868b9d16f220ec9488257a646e0fed0104327624533662864d4879b7ef9dc27d0fff5478b606b7da859b70239e76fd35960bd4644bc7a73d25d135220b5eae2fe57d4fb21bea88bbda256af5f6de04fa209bd234353bf91bdc7b56eb108bdac3d1a5fe1bc7cb9331de312bbf249e91b63068ae8e4f60df8596896a1037cf0fb3a4abf87aefd2eb9ee0e75fc10ceee347efd09d9b3b54f08436aeca45b4ebe845242bf28e298f3cecb2403d035010f9648bd3d91e1fa199a225a998b2b423", @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB], @ANYRES64=r0], &(0x7f0000000400)=0x3) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x3ff}, 0x8) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") sendfile(r0, r0, &(0x7f0000000200), 0xb47f) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000240)=0x91, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x81, 0x0) sendto$inet(r1, &(0x7f00000004c0)="020fcf5610ffd339e26dd1205da7de00004ac21b9532a48d461f597275b37eff98ddfc0c79c1bcbcdbd120e8379c3daa1c0834adcc3fbb6d4f76c40729c11c88884bae6a0369c4acec340e2c28db6241e9d3f00d55c3f6024bfdf4b4948513286b367032f4c235f510d0a787da9c87ed0a721cab4ed824be16556ef0b1ffa6f1e8c248bebcbe0a9beaf23d6ee633876630f36b05c77dfb88fb6191187e1e7629b2cf07c4e1e07420431bb87ede56f71d0921f5", 0xb3, 0x20008004, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) fremovexattr(r1, &(0x7f0000000040)=@known='com.apple.system.Security\x00') fdatasync(r1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, 0x2e, r2}) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:03 executing program 6: r0 = socket(0xb, 0x2, 0x0) setrlimit(0x9, &(0x7f0000000040)={0x8001, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, r1, &(0x7f0000000200), 0x80000005) 00:15:03 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x40) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000100)={0x4, 0xc1, 0xfffffffffffffffb, 0x0, 0x6}) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$VT_WAITACTIVE(r1, 0x5607) close(r0) 00:15:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0), 0x4) r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:03 executing program 3: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) process_vm_writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/126, 0x7e}], 0x1, &(0x7f0000000680)=[{&(0x7f0000000240)=""/210, 0xd2}, {&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f00000001c0)=""/56, 0x38}, {&(0x7f0000000440)=""/221, 0xdd}, {&(0x7f0000000540)=""/177, 0xb1}], 0x5, 0x0) 00:15:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x92500, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001400)=@assoc_id=0x0, &(0x7f0000001440)=0x4) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000001480)=@assoc_value={r2, 0x1}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000011c0)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, 0x401, 0xfff, 0xc743f6, 0x5, 0x17d}, &(0x7f0000001280)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000012c0)={r3, @in6={{0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}, 0x800}}, [0x2, 0x5, 0x8, 0xff, 0x3, 0x8, 0x4, 0x0, 0x926d, 0x4, 0x1ff, 0x71961c2c, 0x8, 0x0, 0x23]}, &(0x7f00000013c0)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x1000, "021ba3753d8861729c0a394ae07b2b0d59dca79c5a52b2ef7e7b4408cbc479dd7c1ac12717266c0a560942c6907fcf7e9a2a7c2a624fcf52a6a0ce5be93a612cda125122cb8e1eee940d14c725aef89ef6ad0321329c6072529efc5d6533d3181cfa579777d0e9eeb2b825aef148c43416cbdbec30ad925dd8c25e1bec3e02af17bd918170ce2766c52701555a813f4f095fc32654d8d854da91f69811341406046e46e1f456806ce4a7cf0949e1e648db0cb03a33273dbefb1764cec78c60d303d247dce87072b671462e0a4da40d13c1ad1417d60309f72528f5f557ba17bd2fd4502706b67529bcbbe556f404b088d94b385bc55b6439137cd2d50cbe3c5637bf27a70ff3078b3f84ecaf7dbf34f31729bee7791d389981fcb0fc68f1c06b857583123169e6996024b290dcbe73071c5394b882d7d0c5f12a3990052bf48e2e2de9d344f141257a60e375d847d772060e3687f495a8db2daf96e15f2e55485003601682a9874c095c3df0023766c3ece475ee57e2700cdb82e2dc8156f9b039f7f366570e5f16cc5f377d5ac8db318531571ce4190328c582e3b217e8e373f45ca2b96ceecfb1c737c4914c59f57086486b07e78a0f684bda5bf77c8e1f55e77766560867011fdaddac00184795f21816a0ec08770aad7477b62dad17d2dca7be8f851c8b99f9db6a03aba026632818519f0014edad918d01e416d8ba1ecbc1b7fdf8c8cf8ec45b4c7b7fd32eb2e9b8da9193224dc011369534e53bbf656f626d6e015633af40585e17419ff77a2f58ba68272ef900eebd3c84bff3b5bb5297cefe6d825ea488cffc97f643c1f4e8b02737b39e01dc2a555d7fdfc103dfd98ea984730f550744e567fa775d8a3cae24f79fba69349906c74d6408b47b14e2ddae0b8c15c4edc6161d49725b51d593dab62156b5266105b79aba21b7bbf4b643d65322ab02089836da4a08610f86da21f87dd456cd60224fc49429c51f72116adee0e3d7d078c22071894c4041c23621c36497039bc4dae139f9983e1af7adafa99810ba2fddd0d475cc10aeed66db3c6be4e35ef4df738ad20314dfb42d68965f339457945992385c0a2df7be02f9d872f2301f058e8adbc01a430c3401b5bcffb7790394043257649f818a49d3261c768545045f2ad5684d536ffcb6b5aa03a9e16fdea422bcaaa29378c4a43e959dcf29c3c9e798b704a1d2a4b580172ca7d8cf47a7a68d1baf410cfc9ff6f6f7034d91fd9148ee8841966463681df6c124a80ad1244fcefa2a7ade40c72882313672678e63e58adef14fae4e9d50df03c0c3896547f64cdb659a0f93688f2efbc5795d48b853de3647ccbcaa37b657d6dd820eff7ddd196a7e8db497612be35ff6dfcc38c548dc5444024e0aa339f1fc2d142abba663b1913918b653611a4b7cde07c67c2abe58a353b828e4f892615b37de2551d22da5a7ab4e634f6ed424b3b002661a1f66fda56c945487bc1614ea713fc8fb982125696787c0328ba1261acc5cecbff00e4279a90d914d985c267ae4abfba1d09d59063f6cf8f3955fdfcdfba3aaf65c8c35b0bd8eb86c33e270004c9bc8f29357abf4038021a5d26769d006386bf29568b7c3b0e32748bc04655865724ee731408947e758d7035be34c4e7c8dcf39ca243e8c36af39d2f6827a190034e0e9ed076e59db8846f10f92388f2bf87728672321a139e47ad1964868bca54aed6d9dbf98c49d4243193573657cce7d3d773417e4e0b7e2966912760ec10d026be1fdb20ff3728d75a95c78cdccb34f6adfe20869692bf43a6d0e56d18e523229717f33568e7e9ec089f37e6d8353b4b27b1e3250f56b3f78296fe0e68f9291e53eea97281d17f5e195c87f4d35add5d6cc965dfb06a26020ff4c824fd6c3646da7efcede17ee751d403bff3762e5c98f5995b011e3d84380d8a8c3c7762c2e37018bb61e6d0cc8bcb02a36dc48723fcce8f822e286b41dc42ddad41d25d0bdb26f879a9a0e275064b2928f2b81ceeab753475b15f2943bc7d4ba108d50f85dfcaeddece0e82eca28fd77341818e92af8a9d186be73fbad2dfb7127bee068fb401ecef53fd0e345e119c78d3f6c0936477eb58c48d95a02a5ac372b358a24d94e61c703110f5a96225d9195a744337590cfc78791004320dc13fa3b7c8d8f3cb5b2d62fe3cf033b87a2fc3c519608af7be1c55d699e5b3a49f8404b554b0662b43059379cce8320d7d954523fdd6f5ec9aa86c7ec6d20650084cfb97c7a4ad7917d2f48ee351f58b4811998fe2edd8ae09865487232cf175915d39c5a6f400a1a61873b57bc313c93eeaccd77787893495668885b8a02614f78c73f204d883a3a64091d8b490e75504fcf00eee982bc7da27ec913431cb99dfd0fb809102dca8b87f1a062555e8d2e5d3399dd89f3a254593a129d9e77e7365be0e73465b3b21c8c007c7ac2f31d53ff63dbf8c519d3edd58685b9f0b30b8e9d1e2ce5a4de581e78bf3fd4303232050090847ab117f4121885068f48be946818e00bafa779135f7ed735e16c898912eca632cba88607641cd5f7d01db37e0c1eea65f8f6e0f51c18a15e2107e09e537e6ba5c824c844dae9473d1854b0198ae94f63134cdfdb40c65d95bb5ffb950f5dfd9c852fc9b4b7748598b1192959c6c2d7ea26516107fc5fcbbcd6f0d090a04d944020ae24f3863894d731c3fca96603ce935c09095dd133ee91a57280e3f717f71474ce235e06d1c105242daa2e749cd11fd7b24def646c715de002b939fad8fd461befd9bc24213702833b99de65d720fb0f0ab82aa4df0f5880aa6633986192bc30a7a4809a15aee3032fe0b84b2dd38000c882cb4374702194e04018bd202d49adb38f95ab65d4d431696bfa06c0101dd4730f13a2ef0566eebd12e692e04df82498d272bc300496a8dd1ab6858313651333a3c625331214c8b4639597d3ab2ad1022d2874d2a5ea387b09854b8aaaa12fedfd16a5a2ec594d73ebd3771c7ef7a846c26faa074eef96fe7fd7a909987a2a156c7e668da36967b555b1fcc3ff28812e00dce9c2bd355a312a1988e199ea8b2711d823df7031a6b5e4d383ba550d70cc67d20858fbdafec5d78168c6d1738ebfa6b4dc3619b03a44865faf8e34d04db53c2e88c9b4e38fb019134fcd7557b65bfaf31dab5d8fbfb5782ccc12a59773889d01800d676be3820bb5ab5fa0b209b8e1dee4a433392d11a530071a2ec26a8385ff6ec13d8364b09add15ccd9375adb7d1a1d9c06372a90f69a583a5aeea7c715636cdc02a20565a5494272c7825dd74aeefebdac7e589cfb6db6e85e0b2a2c07919cacb9cb047cbff133b60090cfaf5b4ba13312791a6bad0f86db0e255247e1102f2ba87ba10b0754ec58282d9f215a21ed813c305c1f8792c34f3c6323b01cd09b3c8574861b3362cfe729f71f62241df58b20de3c3bd07e98f486620e536bebc16b1d888556ce6ebdd21d695a50a7a79966eeb63af95be7de666257a358745d2961cecbca639d4d2186795b22afbc398e53858bd45f40ba61e30e9606da4f802cb2838f52bc5fde2f9ba602a07de56f356f9e0ddd646602cda37315812c17e8b0a6a95767d73f1acdd93a0674b873e96cdf1e1e861eea94b61213f4263397a13c549f8a72c36e5c71793569f85ff2ba427c35824c6b993dabd42ff8290257e504ada0afae3854469b8a695fd4acf74a050ccd4dac45947d1160ffae445e4506b0760843e28566b4d096f9e298625a840034929739b4f29a3439514cc671941651f217e50e76d60c15d7b44f96c7774204ae514e28e9b1cb357a12fafa4c8a98f09a75595a46c01b094395b64f0c6a118eaec56afb702a468b3ccac5b01cc051afe85584b4bad104f077e18d6d0fd7dbebccca36811f149a1020affa8a238ba6fb4b88e0bdff79c89bface99bd18b373609ce329443790e29985a817ce0850eec7304a9dd3b5e6cec99e1602d427e1f31eca56e39bee37eea801aa88bbb1e6fbb221c3aece9f3139612c6ac9502027b54d99e45f3feaf03b6f1611a9f1966072c7aae718055821449d4b8738b10be13c8937e7cdc053695c61ca4cd3e259ac650c439032fe4623aa49ea975a89c27962a3b7ad33d4d91fbeee2a85a0aaaec5c76102d797fddffe340dfcbcaf23116092d4fe71708109e48cf574e2df7b9d5813efbd7955cae7dae481360be1aa56972ccc02148fc5075647f71769e8fd311d993c3629667603c4169eb36969e70a3daed3ec18b1a43c4c94542cda043d8ae0731771405051b481e4813a18ce5cae4080311c29c51b8d7e12bd225ddded290474de7e25698013a64db5b6ee036775b0ea54b5e784972e9cc5342cf6b95a49840a54ed952147393c5875225dcc3778ea744e38ac980e0f5a921d6fc371a39fa15467d129361b9fc820d71519b127d70595e266b7c47d6c5beee710610865c8f491e3328f4fa5006e36369bd0c18c554219452b621650e8dad9bd5ddfbe8d2164b6b743411ff74235913724947eff9c68084396852302961da9083cf4e6b17bf6644074ae1fa8d64f80175fd4b78b72e85e1fbd0a269a5e64ec4581e45040f05d48a2d446f7152bbc26def0fa024a58b61dcecfce631b689df950f0ff30da7b218fa0ead126287a49616c097b71cbb4cce42168bf693a0280b75e9334131ae747311ba776830cdca9875653d9ade9583a9223a3e921daaa5931897f7c9f1f27c65fd2a9399c3e68338c3c15b963c9322470d71f2316405bd44c79241ce7efc21ee6c0d7196a9787d8f68deb098089561202f14bfb6d6eac8261a57f2ce7ba77c5cdc62c038a7a643a248dfe12362f47bc125b3a162a3ddcee1638e0238b737351f43a08da31b681213c06272630dfb5d6b1509ba2810ae77ea4a848ce8614600f30b22aaf8b7c24dbbaf58f75a5f193b8809b27416f731132b04a6333b71038d8f5a1afef086cbd08aed7dcdb6d12ba5300ff50071bd035eaaa516391a5b010201720a566cb421a9caaf50c9f23423a0ef58d115b53300d073ed64ee8f60f23c8bba19bbe895015e702ed6a75df69b213143430363b8b6223a09fbf3bd7de07f176c94d0a5f249fc1f7e5f3e864a95dd5994beb5bddd88afd88b9171af7eda9a53be1187075cbc23f558692f3799630435002e99c35f7159a9518eac8f7aa8dcbf18016b47b8014fa37189482945c6a611982adb19ab917296f5084b86d7fb4521100f15b5d647935643995ad5a045ee89f2de7a1e84011143facc999cacf80093e8379d2be20d30855bac1faf55d1af5f1966aef2df7d812c2ca5797db6ee5249cb32a76e76fe148694c1a25bf0d52511d2004c640f14797c50bb79b698f77700a434070ff5d06c722cee5e19141191863aea6c969625fc3a5e7e9f3519f389e4e693b3103297f8d1e9daa057469f782e779abc159e7b5012c83d2bbb6d0c6fab6e87b274c664789019199c186309425c04597b026c7c29811e8e424c2e0cbec75841d12845821ec69913488e5acba8dc6a4a081aa784c799ee9bba50e60de615ef7786da911a19cf0e8f297b250e420ef9569378e26da4584b79533a2bb23ca33c3bc49ef03eda466850ae7819fa324293024089cb938c6ae89557d9c1d2344a877465139701807a12bb64a2221e283fa8a7ee7406aa234add5e6a8b56c22e7bc1e99f56a9132fca0c1dd8dc7222af880d6c955b4c35ef8804a70a698325e478b26fa357cc212849eed32e77a1e6628c0a6e6c17ae6dcab6f6b9d6bf6f15149ca8e5e32458d3d19b9345c8fe4e458"}, &(0x7f0000000040)=0x1008) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000001100)={r4, @in={{0x2, 0x4e21, @rand_addr=0x9}}, 0xfffffffffffffe00, 0x3ff, 0x4, 0x2, 0x20}, 0x98) r5 = socket$inet(0x2, 0x3, 0x9) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000001540)={0x5, &(0x7f0000001500)=[{0x7fff, 0x8, 0xffff, 0x100}, {0x6da4867f, 0x7fffffff, 0x5, 0x5}, {0x1, 0x3f, 0x8}, {0x100000001, 0x7, 0x5, 0x80000000}, {0x3f, 0x5, 0x1, 0x534}]}, 0x10) openat$random(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/urandom\x00', 0x220001, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r1) r2 = socket$inet(0x2, 0x3, 0x9) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x80002, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = semget(0x0, 0x7, 0x100) semctl$GETNCNT(r1, 0xffffffffffffffff, 0xe, &(0x7f0000000080)=""/38) r2 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:03 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x200000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x78, "c87bec8de3a81b98f583f119670187dbe0495fbb2ffd48aed06e93a8b950297118bc8b6a1d4ca7421775d47230dfc900906117424ee65596d9a617658c0e168d765f2c165c9d3e63084293ba2e2f93efbe416a0641e8a830d6ef4b91322c4f39941bd815061d382796dcb1fc6b10e2ef790c5e6928c7becb"}, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r3, 0x3, 0x7ff, 0x2}, 0x10) close(r0) 00:15:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:03 executing program 6: r0 = socket(0x10, 0x2, 0x0) finit_module(r0, &(0x7f0000000140)=',\x00', 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, r1, &(0x7f0000000200), 0x80000005) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000100)) 00:15:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r2, 0x50, &(0x7f00000000c0)}, 0x10) connect$pptp(r2, &(0x7f0000000140)={0x18, 0x2, {0x1}}, 0x1e) 00:15:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f00000000c0)="97613a0774ad23e72625c029438b42c4e3b4b2ce060e728096a712de382e4ad0fa9b5cfa96ff66f336e1fa45963800e45e5a7bbbade094617af2c8812dff1fb50713fff34a9f2280b6419b86290648bdcb99bbf9bbb33f57f4dc8c8d29dd864065b49354e57eecf8b21643034ffb9f4ff9b4e4b687abdec9ce2150d674d2eb6a1e4e3fce11e8e6e1333cdd6aff5a5ea1c51d6b709aadda4176c6eab51643b1bd3c5026d692c915dfa0869336282c", 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, 0xffffffffffffffe8) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x1, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x20000) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000040)={0x4a, 0x8, 0x6d, &(0x7f00000000c0)="49cd21429be891e276fa3628ea020026b3be389c252127570cfbeab19f9e6c1d79cee0f3f5a74c879394e8cd3bc275bbc400538f94787de7b1a91f997e222f2a21b90e84829c074cda1bffebf8a361792ae71d5c1a40c2c29d935a28c389cb35baa056787ede0fed9840c3cdaf"}) 00:15:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r1, 0xfffffffffffffffc) 00:15:04 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) write(r0, &(0x7f00000000c0)="6471bc2e80bb4bdfc7752a2e57751a44f381a32ee43ef42755eee55dee9d0148e67e763fb78a9f00baeaba0b87daac4ba2aeaa0d63e5b45f94937da25b0b3224f3f5bf883bfc5cc4c70b8f7edf84be3cd076b9ada62b39e3c798e13029f1c948bc44e8fceef31d6d892690f25162d8e086216f52d675", 0x76) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x2000000000000007, 0x2000040000009) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:04 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x300a, 0x7fff, 0x101, 0xa492, 0x3f, 0xfffffffffffffffe, 0x8001, {0x0, @in6={{0xa, 0x4e20, 0x8001, @local={0xfe, 0x80, [], 0xaa}, 0x6}}, 0x3, 0x6, 0x7, 0x4, 0x7}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={r2, 0x7}, &(0x7f0000000180)=0x8) close(r0) 00:15:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$TTUNGETFILTER(r1, 0x801054db, &(0x7f0000000040)=""/17) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:04 executing program 5: r0 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000100)=0x14, 0x800) r1 = memfd_create(&(0x7f00000002c0)='irlan0\x00', 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000300)) fdatasync(r0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000240)=0xc) sched_setattr(r3, &(0x7f0000000280)={0x30, 0x5, 0x0, 0x5, 0x7, 0x800, 0x1, 0x7ff}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x2f2) sendto$inet(r4, &(0x7f0000000000), 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'irlan0\x00', 0x2}) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f00000001c0)={0x2b35, 0x3, 0x7, {0x77359400}, 0x7fffffff, 0x2}) 00:15:04 executing program 6: socket(0x10, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") sendfile(r1, r0, &(0x7f0000000200), 0x80000005) 00:15:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x7, @loopback={0x0, 0x1}, 0x10000}}, 0x3, 0x3}, &(0x7f0000000180)=0x90) socketpair(0x7, 0x0, 0x2, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, &(0x7f0000000280)) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000001c0)={r4, 0x7ff}, 0x8) 00:15:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) readv(r0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/151, 0x97}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000000)=""/13, 0xd}], 0x3) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:04 executing program 7: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7ed708c5, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r1, 0x540a, 0x3) close(r1) 00:15:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x4e23, @multicast2=0xe0000002}, {0x1, @random="84265e26e529"}, 0x2, {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 'gretap0\x00'}) connect$inet(r1, &(0x7f0000000140)={0x2, 0xfffffffffffffffe, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:04 executing program 6: socket(0x10, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ef4311f16b8821bbb70") getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x40, 0x30}, &(0x7f00000000c0)=0xc) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x0, 0x40, 0x10001, 0x3, 0x81}, &(0x7f0000000180)=0x14) memfd_create(&(0x7f0000000240)='dummy0\x00', 0x2) sendfile(r0, r0, &(0x7f0000000200), 0x3f) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x4e22, @rand_addr=0x9}}) write$cgroup_pid(r0, &(0x7f0000000000)={[0x32, 0x39, 0x32, 0x31, 0x30]}, 0x5) 00:15:04 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/89, 0x59) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x571) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:05 executing program 4: r0 = socket$inet6(0xa, 0xfffffffffffffffd, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) dup3(r1, r0, 0x80000) 00:15:05 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, r1, &(0x7f0000000200), 0x80000005) getegid() 00:15:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x66f, 0x101000) 00:15:05 executing program 3: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040)={{0x3e, @dev={0xac, 0x14, 0x14, 0xa}, 0x4e22, 0x1, 'lblcr\x00', 0x1, 0x6, 0x48}, {@local={0xac, 0x14, 0x14, 0xaa}, 0x4e20, 0x2, 0x8, 0x4, 0x2}}, 0x44) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8004400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getneigh={0x14, 0x1e, 0x110, 0x70bd26, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x10) 00:15:05 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800000000000000}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x400, 0x1c1200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x1b558c5b, @loopback={0x0, 0x1}, 0x7}, @in={0x2, 0x4e23, @multicast2=0xe0000002}], 0x2c) close(r0) 00:15:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:05 executing program 2: unlink(&(0x7f0000000140)='./file0\x00') r0 = accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000000)=0x80, 0x80800) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="516db59d1a7657c6b0a5ee3a38c53a9858fed1cd2cf4f7085b8296d50da76047d5fd9591c40f68e7ece7aee287812ff8e765534e5ad787a934b75774365be271ac6a06e869a2dac541d844c20aa957dd2df519", 0x53) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r2}, {r1}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r1, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000480)=0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0xffffffffffffffff) r8 = getuid() r9 = getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000640)=0x0) r11 = getuid() fstat(0xffffffffffffff9c, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = openat$zero(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/zero\x00', 0x80000, 0x0) r14 = getpgrp(0x0) r15 = geteuid() stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000c40)={0x0, 0x0}) getresuid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)=0x0) r19 = getgid() r20 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = getpgrp(0xffffffffffffffff) fstat(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000017c0)={0x0, 0x0, 0x0}, &(0x7f0000001800)=0xc) r26 = getpgrp(0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) lstat(&(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r29 = gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001980)={0x0, 0x0}, &(0x7f00000019c0)=0xc) r31 = getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001e40)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001e80)={0x0, 0x0}, &(0x7f0000001ec0)=0xc) r34 = getegid() r35 = getpgrp(0xffffffffffffffff) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002340)={0x0}, &(0x7f0000002380)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000023c0)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000024c0)=0xe8) lstat(&(0x7f0000002500)='./file0\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000025c0)=0x0) fstat(r1, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000002680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002940)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002980)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000002a80)=0xe8) getgroups(0x1, &(0x7f0000002ac0)=[0xee00]) r47 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002b00)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000002c00)=0xe8) getgroups(0x4, &(0x7f0000002c40)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) fcntl$getownex(r0, 0x10, &(0x7f0000002f40)={0x0, 0x0}) r51 = getuid() r52 = getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002f80)=0x0) lstat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f00000030c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003140)=0x0) fstat(r0, &(0x7f0000003180)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000003200)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0]) r59 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003240)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000003340)=0xe8) r61 = getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003380)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004180)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000034c0)=0xe8) r64 = getgid() r65 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003500)={{{@in6=@mcast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) r67 = getegid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000003640)=0x0) stat(&(0x7f0000003680)='./file0\x00', &(0x7f00000036c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r70 = getegid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000003a00)=0x0) r72 = geteuid() getresgid(&(0x7f0000003a40)=0x0, &(0x7f0000003a80), &(0x7f0000003ac0)) r74 = getpid() stat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)={0x0, 0x0, 0x0, 0x0, 0x0}) r76 = getgid() sendmmsg$unix(r1, &(0x7f0000003f80)=[{&(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000340)="fe6f9a81d72704700c7faeeea5c6753034aec0143be5c4e1f63ce6573952c9eade6a6f1ae21e13356854031fd705894d153ee4faaa42f5af68144a70b3e445b519402d41ff4a3aeb5302dc53a823f2d152c886d0a7f6cbd75e601a4bab69586b12707c435cc478c9719995e045abd77db2dd65132beac17ff0e83396a0835c334f5f768cbe1aac161dd1a26843fc820ca280e5ab43050303305d0fe1eddc802d569e811c41363b1cff8643da16799bd762d5f5b32009c5046330106496c35103927723aadb02541105609d72d55e8ff1281c05b8b7be2a5dc553226f1cef1ff6a0178c7ea621268352c45d238641fc2119521447ad3a5a", 0xf7}], 0x1, &(0x7f0000000700)=[@rights={0x38, 0x1, 0x1, [r2, r1, r2, r0, r1, r0, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x20, 0x1, 0x1, [r2, r0, r2, r0]}], 0xb8, 0x1}, {&(0x7f00000007c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000840)="57ef7526a6614a97baa2a02a3c7c217aae45a26105767627d0d32dd00b87b490bb0e15a3a0f795aaaf0c092bdffbe0c97a35cd950d30d9ddc617", 0x3a}, {&(0x7f0000000880)="f8517eb8552ce2c392f626f9758f8237ef39b891e17e067b8d0858663a3641", 0x1f}, {&(0x7f00000008c0)="d2fc02bf1cef5dca3c3ebf8554a0893c9bb4f8e3fb0f5c6b8703e48b00cf094733c9aa20f047a2a9447e18ac63432014c4ae428e98cc3c245b4557800209d7ac64efa96808ad8469e1bdff18f2a3485bfa4a03ca4fde2ea540f48fd87970", 0x5e}, {&(0x7f0000000940)="2fd91152a71c1f07a3d1943b9c570c0d4177b54bb2c66437aa4296c5b843e5775ce796aad8ae64578f2f510cc25e4d22ae00f259a3d49fc5cc04c22a055fa1937eac926a26f50b1005661245e316601db968007f03c6f3d983c65ec2a5641f1b24b0b71b32a1d5b165ec02e5eb8043eedd2a1cd3b791214621dd41eeb40f0c5c3d0ac1b657b6faebacb2f51efd521b1f7e9559cecec7b92668ebd91a7e54879b1f491d27a4cf0a0d042c02423d8b5336bf706fd81eace085e642f777437efd4e90bd2314d31b06fd8313818aad26535b0c90ec3161ec68bbfc59c5c6e6bdea15963d455d2177f30c096684b14b0d8d79d79c", 0xf2}, {&(0x7f0000000a40)="0e7b748ccd84a0f336295593b10380d14e76a327e1751731eda745b397c59cfbe956440a492d4bb4c6494b5a442f043caca04e65ae422c33687790f706bb8be137432087d5d0fbf0e411d9e938d3895a571467d44069986ede0151944c9701e59f4f2e6e", 0x64}], 0x5, &(0x7f0000000f40)=[@rights={0x28, 0x1, 0x1, [r1, r1, r0, r1, r1]}, @rights={0x28, 0x1, 0x1, [r0, r2, r13, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @rights={0x20, 0x1, 0x1, [r1, r2, r1]}, @rights={0x30, 0x1, 0x1, [r0, r0, r1, r0, r2, r0, r0]}], 0x100, 0x8044}, {&(0x7f0000001040)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f00000016c0)=[{&(0x7f00000010c0)="eaa802bf56d2401e9a80ac2995444b6879c704fb5cdb930c64f4f0dd2b08a5d6c67cce2ec77f07137f288495ddd9697fe84dd341f061a3f9cef134597dab4a3667ed536265514bccdbb5aa15c52b573f39f00f38cdf1e2cfc24ce0dac4b5", 0x5e}, {&(0x7f0000001140)="b62a049fb83a6d8711e856b3fd74050723e40e0f076eb55d7fa6138ccb9b03f0108f0fdc55d5e9cb7ed8eba4ec9d3a3393b4e0cd4be74bbc104da8d0b9cd6deb4fc3936eab082768b2df4645b12ad0e5b17a2b34f12cf3c3034d72910ef6af6cbebb97e7a8663ead50ae3e5452fb0a69734779ac", 0x74}, {&(0x7f00000011c0)="e14e27c06ce2fbf44e4de3df14fcf5ce1130b70e3bc9b8fb904915311004497a85e5c81f17eac01ed7b30dec50dbae9b1cdf012fba24288b460a59d3ff46ca9fff8bd360c9f783da7350a4256852610b1ebf3fcc6b80d532c330b8febfeeb69d50030463395e7f15adf2da3f613a1531cb3c67acf286edca434b1c073d82d0f0af2f21f73dade978596c7ccf15418943901e7cba008c9705d05895809bf4777aadd2ae59a3821b8a02ae06c50fa3ae3f12a2323790412a6f97ca4e67e45ac10f6bbb5e33805d932b57277bd8a94ee8bce6f138caf739d47667654e19ca68ee2f33243e21eedd209c7afc639e3c780d0cbee5c884bcd08a3d50e7c59f", 0xfc}, {&(0x7f00000012c0)="1e7ec61946da7a5df92dc0ef81876cf80b29f3b0a270df1906c91b6d11487c19f75a3fb2eba98aa6292ed4ecc9699c56b515078fd95cdf7ddb09c7bf2fee983206d9611df70126a99da5ce2b979c5effcf5201d939ca4727088c6131edad0d2dfc0c11e1ee7c0c8f74bce3e7c547ba6df0fb7238f09890a631b2514bcc12c51be2de000e4e4621e6075c282df41fc69354100f4ab0cd21d3f234e0d23480ca721d1c4ff5126c982c953cdc97d563ae62747f8d2cfa32ee815b8409eafcda070004", 0xc1}, {&(0x7f00000013c0)="e09366900ded74a5ffb8a2c94aac0cdb467108484589ea6a90178b107740ca8ca93e19a5bcee88ea1e9052b982a35bb6440c94d4eb5125a3", 0x38}, {&(0x7f0000001400)="71ad43e6c3693d8bdb10886c8d2d6177d47c7996084945f1317f67fa346053a46254b8df56e503fe4b4098e774b56b31a5b628211ec2f19231ef3cd1fa148666f49d8d83a8d80bdc4ceeee738a75857ac7d541994586b2cc355679a5a70e42731049a5fcb0a0299aa6ad431b56d9451002aa03fc0e3cc8f02946c58b0506f818d64b04e776e13b58078350c409665e381cee73b6ffbe023e086a4a724d668100f3659033539be2aa79c5a4ae668484f79cd32b7d3bdb8fc27dec6e5f596d9496955265ffc482928f34916d970977e32a5d151d31d08fa08d86ed7ed830bfc206f5", 0xe1}, {&(0x7f0000001500)="3a5b3cfd3eafb632bde257e75f2dcc99bad0e808633ea63cc2bfe17f9e2b4630fc502e649db016f07554d4aa62f0155c83f8659c751c1d3bf704587cc85b2f3d8802c3a878728f1292525bdc2b4db03d75c6481ecef584150f4fd90385fc0da55755430113800e10d84bf77724a26dab9a418ea18f991d782bc3723a259e88f3bf5f5fcc8c46924fa6659790c9e00854cff061439979bfb40d37", 0x9a}, {&(0x7f00000015c0)="8d8c1ba15d3bc028727bd070f460f1cf61b52c0119ef05bb9837855e5a8cc8954cd04ff54d181db50464b208ef4079fd1e5ff335e3342dd5adf2a1cd310f97723205c9d0388e1dc90bce0d612a424033dc5102436072fd732b20dac220e85443f6f078f7fb32dedde6ae6cf4da005eb4e1cd8979ab4aa6ecca5f83a8679eb48b672a9fe9b509c6fa75fc6b3b799e56b6e34d8ebbaf8a7c29978c3172747f3fd08469f11aaebcd8f803052a0aaf9d03101e91a6db49644835b1c1b718fdfce273673bc4f107016f863773b2729df96d6a563e7eb1010e9a5095e86c60357ce9d8e9d2e6536e047f197ca021", 0xeb}], 0x8, &(0x7f0000004280)=ANY=[@ANYBLOB="220000000001c20000007ffe8b75be93fd5485ff64001d95d17712b3615995a0e1b2eb23174f49f872ae401d36c3ada75e7617cb9bb1688f48b19f93f26e008ebb551acb2d67015d2c1697bffb3d3ccdfb144abdec95011e0b062ee46d10b27b5dd62f387ef77faff43f6a0766b104d040947a72d686fecb8545021726fa3ab26fed32591c056b3348668d9290119c385fc6cd765d657c691b1d122856b64c2479a8133416f3ec1630fe1242d1326b7df4b115e1782c334901c53df9bd159b95fce47f7e98b9461eeca48e5d55907e012ac82628d054288e54e6b9f74bb424de9f5df8f07d131b632ff9938e3d374013233d56c39abb1442a1283594d4dd55a4bbb8df787d6ccf239a236da8a029d0aea582421d4144e37a7d76774765593be894574241235f9dbba6db248d9c6053e7a6be2ef2ee755270715b983a30a86b9f34bc534b18f6a0d08e116338bd51c40ce45c3d80bc00999bfe8d9878fd5e362a39cc9015b25dcbadf99ed84e7036ec2c1d209f9e559ad940304cf6dc6a93f067eb27bc81894fb49273ffee283426d2fb6ce54370393b7a857dfedf8fea", @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r25, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r26, @ANYRES32=r27, @ANYRES32=r28, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="0000000020000000000000000100000002050000", @ANYRES32=r29, @ANYRES32=r30, @ANYRES32=r31, @ANYBLOB='\x00\x00\x00\x00'], 0x80, 0x4008801}, {&(0x7f0000001a80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001dc0)=[{&(0x7f0000001b00)="2491998878616aca95e633ec4b36b28e7f311d0c5d28fac87bec63692d", 0x1d}, {&(0x7f0000001b40)="22ea3e5c657ff084023a6f600a06432ce137866186e568f375fb54e342a133d47fc1ef0ad3c5ddb074317f790c969d6f7b022f733800acd9e1b50a264cc9fe2f6a4cd3a0f43699db198d5ed6ed453fdfa021bfb21dc38d1e40dfdfe3e489a35b0daff3d3c25513ef21f602c628f29ee80c93032141d4687290ed61800bfb31aaddf138938a7c24", 0x87}, {&(0x7f0000001c00)="bc5b0a38e1e515d1489aa057307da985bd488d4ccd17bcd4e047c7f7413b0f42f3e8f6e134917e66019f9dc989c4c187f957019d0f352a6ed9bffd478d000dcb2c951c935dafdab148146f38819959e81fbc", 0x52}, {&(0x7f0000001c80)="be9b7c41f2fa1cda43075d3540a65e55b1f10b8fac415ba45686c3950dd61a0f3d4e7913017ca4482c38eb1bb1d02f5a5aa6918254c81c4314ece45f02982341d88fbdd72bde722ce568115a13afdf4b6d411d8a8988ea7fcf3019291288355c5925581e067f580bc5321f4e61f4dbaab5ba18de2624cca3fa60a48ab7916ef47feb1b280469f564de7ba61c3cc2524a204e94620f1f790a3607858d1b636c1c67", 0xa1}, {&(0x7f0000001d40)="e91b2d53b72940c9a80cd63a69dde18418e17152102b9dae05abe1441adaf90411dbeceb9e63de0b2d8c7684806a65ff6789d4a656d253e2370596de8724e9ce3f872ff2f72b40662c90dfafc59d52e6", 0x50}], 0x5, &(0x7f0000002080)=ANY=[@ANYBLOB="30000000000000000100df0000010000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r32, @ANYRES32=r33, @ANYRES32=r34, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r35, @ANYRES32=r36, @ANYRES32=r37, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0xb8, 0x8000}, {&(0x7f0000002140)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002300)=[{&(0x7f00000021c0)="bad6ec", 0x3}, {&(0x7f0000002200)="8f65546402227eb2332203680d4cd0ec816688aa06b73b6481", 0x19}, {&(0x7f0000002240)="5ab99925d08d09af2c821eeb0c6f5a0d23c573af5a5c97fb69c275d939cbbfd0250df66142a870c65f9dd0538d10eaaaf6472fd70cf45f1e29cc05b551a578b95fcb40e0af256a2ed83ce5ae5173ee7664c5986ca98d4803d344bbb86a37768264b020b989a2ccd813b7721880c7e73f59620112f253f75f200469044dbe8cba3f196f1e9dacc2679ced", 0x8a}], 0x3, &(0x7f0000002700)=[@rights={0x18, 0x1, 0x1, [r1, r2]}, @cred={0x20, 0x1, 0x2, r38, r39, r40}, @cred={0x20, 0x1, 0x2, r41, r42, r43}, @rights={0x30, 0x1, 0x1, [r1, r2, r2, r0, r0, r2, r2, r2]}, @rights={0x18, 0x1, 0x1, [r2]}, @rights={0x20, 0x1, 0x1, [r1, r2, r0]}, @rights={0x28, 0x1, 0x1, [r2, r0, r0, r2, r0]}], 0xe8, 0x8000}, {&(0x7f0000002800)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002900)=[{&(0x7f0000002880)="e31a57b67bc14f48be9b6b33efa7e87c99f71979e303f8308d84913f3662e79458c41219fa034325384229d72ef4319c0754c78df7dc8e8c2d2f79f3683e8e48d367eba59a5f6f1479bec7b07d580dd3", 0x50}], 0x1, &(0x7f00000044c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r44, @ANYRES32=r45, @ANYRES32=r46, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="2000f9f27c467d7b0000000000000103000002000000", @ANYRES32=r47, @ANYRES32=r48, @ANYRES32=r49, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2], 0x108, 0x40008c0}, {&(0x7f0000002dc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002f00)=[{&(0x7f0000002e40)="3467c0ca253b31823877e6a4fda97d19d747a2ef8160112451e7228f06dc82d3dc67dfb6c418c6bb5086889e61133f56891fcb73384a28679491f6904039821516eec53089f4688947f8d5cd503fba1e3c30c0b2a4aadfdc4ca57c3afbb39655e29ce51fc660e82487d5ee7fedb735838153c20be59f1776d2b4f22199833b1f7248eead1a87", 0x86}], 0x1, &(0x7f0000003740)=[@rights={0x20, 0x1, 0x1, [r1, r2, r1, r0]}, @cred={0x20, 0x1, 0x2, r50, r51, r52}, @cred={0x20, 0x1, 0x2, r53, r54, r55}, @rights={0x18, 0x1, 0x1, [r2]}, @cred={0x20, 0x1, 0x2, r56, r57, r58}, @cred={0x20, 0x1, 0x2, r59, r60, r61}, @cred={0x20, 0x1, 0x2, r62, r63, r64}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r65, r66, r67}, @cred={0x20, 0x1, 0x2, r68, r69, r70}], 0x130, 0x1}, {&(0x7f0000003880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000039c0)=[{&(0x7f0000003900)="67b020c9dbfc5a6e8a47fe6a024778a4b2b01cae6cca290c8216c684f6716490648ea287cefa0f2035afa6612cf59b579666df06d50b6e6ff46a6a0adc85e1b3706db33bbeffe33fa6f6b5013551ee834d2ca7ec7d07d4263de671547c061c535b6e2e50a0af37e6a8a92d2df90c2f8b4bf4765e70202e0861e2b8139d3732e0cf4b5e3d2c0702f82d433edf71ba", 0x8e}], 0x1, &(0x7f0000003b00)=[@rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r71, r72, r73}, @rights={0x20, 0x1, 0x1, [r1, r2, r0, r1]}], 0x58, 0x8041}, {&(0x7f0000003b80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003e00)=[{&(0x7f0000003c00)="5b0685c44ea4a57e99100bc69e0ecb193996a88b12449cd943293b01ea059820fc38", 0x22}, {&(0x7f0000003c40)="ba396bf1c293c9d9cb5a909e11b14478180369a7c26eb71a5f0c5d19e7fe16798190d5d9ba086d9c4bfdd5da3d545ead03a611d0ee1657e348c3dbe73eb5bfcf8c542a8c718152f9bc8e7158a707c734cdbaa9bd6927cea1b7c6577287d1aff0b538f17b8136e3c147ee2cd9fdb999edab5e2eefd62cf80a4b7ca9f7ee0d4d339c3601a5b10965c364487733db72bcad242bc5beb094fdaf3447bf9f789fbf11fb425c24763361e57c3c830eac8571f36ee1ec08ad3b26469db0e56803b691b6097316c7aec95de2e1a6d053a6", 0xcd}, {&(0x7f0000003d40)="feb7618f373c856c5ce3b2df5b431c24f817cf7bd7a9b7bf09cc508990157930332d98f6fe2b72698db337222691c9cfa78e426b7242ac06fd6f8d72cf79c8198750333f82244cb67aefe40f062f857a19505e0adb2703ba31807096677bca6cb0754c9456f5978d07cba6c2a79342e9cfade3a96bc51d200095c371d8b6aea39cc447bb64b5d528e4d9685500bf57", 0x8f}], 0x3, &(0x7f0000003f00)=[@rights={0x38, 0x1, 0x1, [r1, r0, r2, r2, r2, r1, r2, r2, r1, r2]}, @cred={0x20, 0x1, 0x2, r74, r75, r76}], 0x58, 0x40}], 0x9, 0x20000800) 00:15:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40800, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x20000003}) r2 = socket$inet(0x2, 0x3, 0x9) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0xffffffffffffff96) 00:15:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) mlockall(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000080)=0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000000c0)=0x2e2d) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000180)=""/46) 00:15:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffff}, 0x113, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r3, 0x2000000000000, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x1f, @dev={0xfe, 0x80, [], 0xf}, 0x9}, @in6={0xa, 0x4e22, 0x100, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x4}}}, 0x118) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x2, [0x2, 0x2]}, &(0x7f0000000040)=0x8) 00:15:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800000000000000}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x400, 0x1c1200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x1b558c5b, @loopback={0x0, 0x1}, 0x7}, @in={0x2, 0x4e23, @multicast2=0xe0000002}], 0x2c) close(r0) 00:15:05 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0xd0001) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) socketpair(0xa, 0x800, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f00000000c0)=0x1b) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x20f00, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000040)={{0x0, 0x1d}, 0x40}, 0x10) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = socket$inet(0x2, 0x3, 0x9) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000280)="2f642f74756e00000000000000c5c7e1105993adbe0611fa11c92163b1f5a9770ad4db7976a537421d7c068cebcab5b8cb3d32e4ef9db68051f086d13849ecc42887423bddee4bcb2a589c4bc971990dbe64a3d6ca15597661dd85f23c4261252eb359ed7eee99a40ed833187da0dd4526cb13b9863d94df856b2dde78f28d68cdbeb824c5", r0}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') ioctl$PIO_FONT(r2, 0x4b61, &(0x7f00000004c0)="7f550bb3cf8ed11c73d4a79d2382f269488f06000000000000001b32b1779a5cceed61d0fde7361fd5b1aaed010000000000868bc17f043413dc685600007c45e1d71059c5f5916f0fc70d403d201bc1102fde51febeadd5ed81532dabf79bd7a10dc12e837f0300000000000000043b310e") ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) r3 = fcntl$getown(r0, 0x9) syz_open_procfs(r3, &(0x7f0000000080)='net/netstat\x00') syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x0) 00:15:06 executing program 1: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xdd, 0x80080) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000100)={0xffffffff00000001, 0x120}) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x30000) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'gre0\x00'}) r2 = socket$inet6(0xa, 0xf, 0x80000000000) ioctl(r2, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r3 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e24, @broadcast=0xffffffff}, 0x767e9a79ce6dbc9c) 00:15:06 executing program 6: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x6c, "967a00c787f9e964d6887e234866233fd3a193d247ff3178cb37f6895ca0c1139b712a0491527d3fa30b783d0eced8eda1857b5b37c22e3a3e88f10ead6ae32860139baffe262a39c04281e0d53f3ffbdc6f1decbb64263bb053bae298b79732e975eecdb01d357237f0168a"}, &(0x7f0000000040)=0x74) syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x80) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1, 0x40}, 0x8) r2 = socket(0x10, 0xa, 0x0) accept$inet(r0, 0x0, &(0x7f00000003c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000340), &(0x7f0000000380)=0xb) r4 = socket$inet6(0xa, 0x7, 0x0) ioctl(r4, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$LOOP_SET_FD(r3, 0x4c00, r3) sendfile(r2, r3, &(0x7f0000000180)=0xffffffffffffffff, 0x80000005) 00:15:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f00000000c0)="07000000000000004710705b2b39fb48d766bca9efa9bc9bae46dff52fe3aa956ff1fe13109562aa310bfde0cb2b1ac0a10700000045053d3454cfa297e271522dc091a2e11ccde0407866eb11cc08cec1d604148e3a5dfb00fd1c66d6a64043d43b05d1c7c4c103ced68837879ba0fc93b7fce5ce2701010000199f4c0772dd3b144ba258c86d0471f94cce55849a9007ac425446c5f73b59d4c72918957f2aead8ef7d3b46cba95cefb2555afe0726cf2988c0efe7768ff925c07237f85cae") r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r0, 0xd, 0x2}, 0x10) r2 = socket$inet(0x2, 0x3, 0x9) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 00:15:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x300a, 0x7fff, 0x101, 0xa492, 0x3f, 0xfffffffffffffffe, 0x8001, {0x0, @in6={{0xa, 0x4e20, 0x8001, @local={0xfe, 0x80, [], 0xaa}, 0x6}}, 0x3, 0x6, 0x7, 0x4, 0x7}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={r2, 0x7}, &(0x7f0000000180)=0x8) close(r0) 00:15:06 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) getuid() 00:15:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7, 0x200000) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000000f0000000000000ed00000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000200000000000001300000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r2 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0xffffffffffffffc1}, &(0x7f0000000040)=0x8) accept4$alg(r1, 0x0, 0x0, 0x80800) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r3, 0x732}, 0x8) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) r2 = getpgid(0xffffffffffffffff) ptrace$peekuser(0x3, r2, 0x56a) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x8, @dev={0xac, 0x14, 0x14, 0xc}}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={r3, 0xc5, "cb06973da5d673d6687140d934fdcb6bb53c19e5249b4310490f8a6200b31d9c5601f8447a8bf39c62ab9558bd7f480f41cdfd1d067afe4201c16289f0c5c394df14c80ac1daf1d87c3ae05d0ca8cbb2e44e98ae363a9d47f7c6703ce522a756c31ed211049f13701eaf5221a89e35e11bb115d4225d692c2d6bc410cc5d4e38cd20fc43f4cb7439426d6eaf30d22c4c362c6ea2832d3565fd8973ccf4fe5579224f011c49fc3d074d46ab610dc34b608b0f25978c4f948936d74320f87eb76e888e8982b1"}, &(0x7f00000001c0)=0xcd) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x200) 00:15:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0xd0001) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) socketpair(0xa, 0x800, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f00000000c0)=0x1b) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$vnet(r2, &(0x7f0000000240)={0x1, {&(0x7f00000001c0)=""/116, 0x74, &(0x7f0000000140)=""/3, 0x2, 0x4}}, 0x68) clock_settime(0x7, &(0x7f00000002c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000300)={{0x9, 0x4}, 0x9}, 0x10) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x94, r2, 0x1, 0x70bd2b, 0x25dfdbfd, {0x7}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DEST={0x78, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xf3c20000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x844}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local={0xfe, 0x80, [], 0xaa}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x40004}, 0x4040) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r3 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='IPVS\x00', r1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 00:15:07 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) syz_open_pts(r0, 0x4000) close(r0) 00:15:07 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, r1, &(0x7f0000000200), 0x80000005) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[{0xa, 0x7}, {0xb, 0x101}, {0x2, 0xf7}, {0x8}, {0x4, 0x7f}, {0x8, 0x2}, {0xf, 0xe9f1}, {0x4, 0x6}], 0x8) 00:15:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000680)={{0x108, 0xfffffffffffffff7, 0x0, 0x3d5, 0x374, 0x8, 0x217, 0x37}, "0b1b7d05a29ba08b641f7aadafe2c7a3a8c47b43b6bfdcd0b9a156cc1c4d73461c53aba302aed2b920720f65f8c814", [[], [], [], [], []]}, 0x54f) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x803) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f00000001c0)=""/145) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r3, 0x800442d4, &(0x7f0000000080)=0xad2e) finit_module(r3, &(0x7f0000000180)='\x00', 0x0) 00:15:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:07 executing program 4: socket$inet6(0xa, 0x1, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet(0x2, 0x3, 0x9) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x10cc, 0x801) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000080)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000080)) r2 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e1f, @multicast1=0xe0000001}, 0x10) 00:15:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:07 executing program 7: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x2000000000000}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:07 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r2 = socket$inet6(0xa, 0x2, 0x0) getpeername$packet(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000700)=0x14) recvfrom$packet(r0, &(0x7f0000000000)=""/39, 0x27, 0x40000000, &(0x7f0000000740)={0x11, 0xfb, r3, 0x1, 0x9, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) ioctl(r2, 0x4000008912, &(0x7f0000000040)="295ec0311f16f477671070") ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x7, 0x1, 0x7, 0x3, 0x2b}) sendfile(r0, r1, &(0x7f0000000200), 0x80000005) 00:15:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x9, 0x100) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000280)=0x1, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000002c0)={0x3, 0x0, [0x0, 0x0, 0x0]}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x77359400}, 0x10) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="80000000644b5b49d6c5f904bec9c89cd343db2979c4a9fb1a37643adb4313d0f2c4a2287f565545b54d0e8924630490a3c379d6b2e403e26723364fe070bc208fa954c6ed27f14948962820891297ec19545d28ed544cdd92c2f917ea07de518d2efce851f4f5c917cf9d9da0b1c0f9a90c2ecd3519677769861417bf91416b24a39cbd"], &(0x7f0000000180)=0x88) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r2, 0x1000}, &(0x7f0000000200)=0x8) r3 = socket$inet(0x2, 0x3, 0x9) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 00:15:07 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x12) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e21, @rand_addr}, 0xec) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) accept$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0)={0xe98}, 0x8) shutdown(r0, 0x0) 00:15:08 executing program 3: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x181000, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000040)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @loopback=0x7f000001}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x4, {0x2, 0x2, @multicast1=0xe0000001}, 'nr0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:08 executing program 4: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x3c, &(0x7f0000000100)=[@in={0x2, 0x4e22, @multicast2=0xe0000002}, @in={0x2, 0x4e22, @multicast1=0xe0000001}, @in6={0xa, 0x4e21, 0xef, @local={0xfe, 0x80, [], 0xaa}, 0xfffffffffffffeff}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0x9, 0x1ff, 0x10000}, 0x10) r2 = socket$inet6(0xa, 0xfffffffffffffffe, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) accept$inet6(r2, &(0x7f0000000000), &(0x7f0000000040)=0x1c) ioctl(r2, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000001480)='/dev/zero\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000014c0)={r1, 0x8}, 0x8) 00:15:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x2, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:08 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) getuid() 00:15:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3ff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x106, 0xc}}, 0x20) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000440)={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, {0x307, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x18, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}, 'ifb0\x00'}) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000340)={0x0, 0x3, 0x4, [0x3, 0xffff, 0x200, 0x5]}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000003c0)={r3, 0x1000}, &(0x7f0000000400)=0x8) 00:15:08 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa}) r1 = syz_open_pts(r0, 0x0) lseek(r0, 0x0, 0x6) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x440000) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$TCXONC(r0, 0x540a, 0x3) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfc, 0x204081) close(r3) 00:15:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000040)={0xffffffffffffffff, 0x1, 0x9da6, 0x3, 0x8000}) close(r0) 00:15:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) r2 = fcntl$dupfd(r1, 0x406, r0) faccessat(r2, &(0x7f0000000180)='./file0\x00', 0x1, 0x1200) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="82000000ff0300007effffffa0606664b3df92d3fd9428d63c21792cf36f32de67da4c41a57d82db2e898251d1a2e164d7e3420580a623a17e972570d485c53d85213716f64ca16fd84b6709c4248a178192371308b73d2e8d048be319f44c6e442b898e7d5f64e389a60c0b0e70f1842160da71100009b66b602af0e1364de105961b8b13e64603a30c28436ae9"]) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:08 executing program 1: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x8c00) r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x2, 0x1, 0x5, 0x3, 0x7}, 0x1, 0xffffffffffffffff}) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:08 executing program 6: r0 = socket(0x10, 0x2, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, r1, &(0x7f0000000140), 0x80000005) 00:15:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = gettid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) setpgid(r2, r3) 00:15:08 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040), 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295e776710700000000000") r1 = socket$inet(0x2, 0xa, 0x401) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:09 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x400800, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xc}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r1) ioctl$TCFLSH(r0, 0x540b, 0x9) 00:15:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl(r3, 0x3, &(0x7f0000000580)="d49ad99b2f6c75a04cda57f3d70becb8b32d01a6c31fa8dff58534e4938b94376b3a07026888e1eb8aced8937f22404187aff15012bf8997ae237163a0f68030005cce3c9990832dc4fdfa9080b6c019fae38e699b101059a0bac506f99b9108319bb327f5d7b1ef172c3359a872e625d56382e763ff146338885d37194bea927ceb76afdeed21aa1d3ea07b48e5fe66a5e18d5786cdfd0713b555597b3f8620627f2216046727517986e6c67183a432be05004336a59c9109e3fb42016a8610e4e74ad825eb48c46f1b97554bc5c4f47e3966f92a4c") ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r1, 0x0) 00:15:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x9cb, &(0x7f00000002c0)="295ee1311f16f47767a671d687cc6d85e41070b33e39803d5630d934595bd83a4d7669dd05991e00ed0b7af0d56795ec8055d331972e3633ef78f82cf03d75705fb42b0173c5dbb78c3b363746d77b6f4dd5c9669fed0677817819980bba09dc32072cb43adeef92f17edcbf3ef1b29ba4d4053d9ef3781d563481d6ddbc2cef29cc2928ff4fafe7dacb9524585c68b2d76a09d1bf4c6f552743b57a43e269") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) io_setup(0x80, &(0x7f0000000000)=0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x501840, 0x0) io_cancel(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xf, 0x0, r0, &(0x7f00000001c0)="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", 0xff, 0x0, 0x0, 0x0, r3}, &(0x7f0000000100)) write$fuse(r3, &(0x7f0000000080)={0x28, 0x0, 0x7, @fuse_notify_store_out={0x1, 0xebd, 0x9}}, 0x28) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) read(r3, &(0x7f0000000380)=""/82, 0x52) 00:15:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 00:15:09 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r2, 0x2, 0x0, 0x0, 0x0, @ib={0x1b, 0x4000000000000000, 0x7, {"63c2f505c6ef3f32aa1678e6fb6ed2b9"}, 0x3, 0x0, 0x98a5}, @in6={0xa, 0x4e23, 0x3ff, @empty, 0x8000}}}, 0x118) r3 = socket$inet6(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0xdcf34721f3a77c21, 0x0, &(0x7f0000000140)={r4, r5+30000000}, &(0x7f0000000180)) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, r1, &(0x7f0000000200), 0x80000005) 00:15:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={r2, 0x5a}, &(0x7f00000000c0)=0x8) 00:15:09 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x44) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) clone(0x10000, &(0x7f0000000000)="229f9ac81fc4a93fef8dab390e70bf34b7a7c60a85f05e310807ff6e918d40fc81144a41000dfeba279a950b419db34672493a48e34644ec971d66eb3cfb051dad8b153e3dbbf03007e8ff322e30ced4411ae998ea7e7a7895bfe5b3b3cbb4eeb0984061b0cb3fb08182acbddae30ad8de6c9c", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="97e007b6f55b0e402d7aaaf68b2ccf228cd80d68f8ece92dfce6ea50fef2365c4a9a07a7b8adbe5db47b221891d097ae3434116ca99d1cf9b590057a7cf688f1f32644e17d716b574883ff0994431075c2cbde601e34f7243f98fca70ccd8dae1e5f4f1ce5d12ba4443b3f8d509d2758cb9a30dbc8a437b6ce1aa46d55c6b04e62d81159c7") bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:09 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x101400, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2002, 0x0) setsockopt$inet6_int(r3, 0x29, 0x43, &(0x7f0000000140)=0x2, 0x4) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r3, r4}) close(r0) 00:15:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") syncfs(r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x410000, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000000c0)) r2 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:09 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000001240)=[{&(0x7f00000000c0)=""/154, 0x9a}, {&(0x7f0000000180)=""/28, 0x1c}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/57, 0x39}, {&(0x7f0000001200)=""/4, 0x4}], 0x5, 0x0, 0x0, 0x3ff}, 0x40) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001380)={'nat\x00', 0x0, 0x3, 0x37, [], 0x1, &(0x7f0000001300)=[{}], &(0x7f0000001340)=""/55}, &(0x7f0000001400)=0x78) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = socket$inet(0x2, 0x3, 0x9) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x6, 0x3ff}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r2, 0xfffffffeffffffff, 0x30, 0x8, 0x7}, &(0x7f00000001c0)=0x18) r3 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:09 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f, {0x2, 0x7, 0x1f, 0x9, 0x6, 0x8}, 0x6f37}, 0xa) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") sendfile(r0, 0xffffffffffffffff, &(0x7f0000000200), 0x80000005) 00:15:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000040)) r2 = socket$inet(0x2, 0x3, 0x9) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) [ 435.637441] Unknown ioctl 35296 [ 435.683328] Unknown ioctl 35296 00:15:10 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000040)="295ee1311f16f477671070") setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000000)={0x0, 0x1, 0x101, 0xfff}, 0x10) sendfile(r0, r1, &(0x7f0000000200), 0x80000005) 00:15:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = dup(r1) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f00000001c0)="e4bd06a51640872f4d2ddb13cabd4d9e44367b55d81c8a52ba8726e08d7874c4201c1b333a78c73c768b597e50c1df2322c254ffe87e48fc3400ed01f66a3b2629fc2b223425ca4d47d6cb57ae3c623ae85fcad7a7f1241a3b305ecb75f35841ce8e59ab1c9b44cf2e68af2417155b63ee3d985f5b58a3ff8e5bccb765fc2cdccdb195fb43f96531a762fd8fcda9297666501b15dfaf5609fe4c4e8ba97482f1672d8a977ce9") shutdown(r0, 0x0) 00:15:10 executing program 1: socket$inet6(0xa, 0x1, 0x0) r0 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x7ffc, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x2000}) 00:15:10 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x2f7) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[{0x2, 0x8}, {0x7, 0x1}], 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:10 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000100)=ANY=[@ANYBLOB="6e617400000000000000000000000000004be3975facbb186727c80426000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000009c0)=ANY=[@ANYBLOB="000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000f4ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b9027453bbbc22bc750d55f50361d4c81566fdab5e8e9e7"], @ANYBLOB="00000000000000000031645fd5ee7074ee0000000000000000000000099a4b3d74d926c6ce612b18020836b4ba3d5b975965def7b4d679776d13803b89b8890888f2db388794d3b28187a4d8e1cd8d62aae88036ddb6c58049ba8af97257cb4792757ea050651a4d35b0f198b358549cf80145aa39e2b8cfe368ad59b06110c17f68ebc414a3cf20"], 0x98) r2 = socket$inet6(0xa, 0x1, 0x400000000003d) ioctl(r2, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r3 = socket$inet(0x2, 0x1, 0x9) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'team0\x00', 0x1}, 0x18) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000b40)={0x0, 0x1}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000a80)={0x2, [0x7fffffff, 0x4]}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000940)={r4, 0x1}, &(0x7f0000000980)=0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000b00)={0x1, 'bcsh0\x00', 0x3ff}, 0x18) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000240)="a4644fba750bb08036a12e90b1eaa7f98d25bce1efe47dcf5283ba178ce982e4e4dc2b718abdbbb660977294ac0dfbc17f688c4931ccd159e0863210b63b8bee4ffaccf3bea63f7da1d54466ffb94f0d989fe1da7e024e0cdeec5732df5ea29d697119a4aeb38abaef72eaedfb31d6c1da80d81207c3382d9ca5a6461ffe93ba879e11cd35c0c8b031f4a884799a1f3595cc143ac3d0cc32ce792068b84e9e59e1efbcade6f44c2b1aae139038ac2c473d19773a4eb683bc215b2fa524ea55f1568e62d0d5fc8d24ef78a2ba996b730dcb0872", 0xd3}, {&(0x7f0000000040)}, {&(0x7f0000000340)="d76895b6a98a9beeff5c2958bbaf0a6f17c5092a103f9b32e064f36f9db432ca29f0c4a1a9a129e1f0da6e0c76cb8f72b4193897d8890159b9d3b16209e210a0bbc2d3557403fb25efddd369a9780d4a690b4e89d7c517fec122a0cd5c7973bdeee5916546d5c7f794acfee304def0b2840cab3a21c04e7cec9f1a397c744153fd5885e01c456b5676923080e890745e5d4c0c6601286b", 0x97}, {&(0x7f0000000400)="bff64a260ca6a073e8eb59d53dfa230c1e251adfbac070f68b5120c95eb1ce2b68bcd2233ade5de5aae685aefef591a82789f2591c4142388917fc20724c91aecea4bb9b0d0529434f5a470f384479baf65b79c7573487af6066966e3275877c4a212993ac9ea1c5dabd934728ee32235c", 0x71}, {&(0x7f0000000480)="83b42cb61697992ab490cd9eef0e71cb70811fcd8772fda3e52dd1d4ec1af9f89ca7bba53094e07d8a8ef8bf2ff3c7ffbabccee547840b70e6fa7b0c4a6c59f9fdc05ddd6ce3bfeac4be07ef5779ed7407da98983678a86b856edd5d2d877f65717b695510cf5a7ae860bb1c7542f1c06b7824785ddbe8b4283138222050eed5af8725c1899e86169106ec65e39b4f116fcd0e43b1e00724f3ebab4f6f4eeb67d4e4c75d000a5a7f05e339bca375ab6e4bab8c19517cbd61d704e9a01e2534af90c9795cffbaee4d84684e032a480863715c6b4d2024e149dc7e15e9fa20e74969", 0xe1}, {&(0x7f0000000580)="c018b63a4742410e06543ace6e808a8f62245407acb66cc52f0f1a5cef5e53754ed2b983420ce24824c8f07068a554805e8590b801e2022f2780dfcb1eb165cd4be836868ddc9259181105913447522b77c68bc385a275e3ea15bd5598d5b749f2d5bf27c60a526d89d853deb35eab583546029a687460ad064b81d1a923124aaf5d3fa2b9ab21a1bec121f61c1aa4469245d470041b11", 0x97}, {&(0x7f0000000640)="f6e34f678bfbead9919672c03d298af1f6d2b2f8b7c028e1845cf3fb198d2cdc42b705f88a7c17774e006adeea0ae96c710f1c47e048a1b5439170a055ccdace68a258b04d3c5d1025fcb7de212581d63f385fb124d11c76b4849b0a92f0bec4965ac8f1f4e5bbc89a2c8be372470987a8f06a0e5610ee0ba8030f0f853d641a257a55ad2840fb86ed7675d10b683bf198cced7f293cb15af8b93e31400273f04b51e3ca85e696b9e89c8cd8", 0xac}, {&(0x7f0000000700)="93ddf5259a662cb78e119a427d96c5200b140e6d7f598c7bdadbd82c2232b817fc603437e6e84573580ecc93526eee", 0x2f}, {&(0x7f0000000740)="91e5063561678b626ecddf2d4ef942ff9c15bd4c412a43e0d2225ae388e67cf58dd8bb1992c4d54976262552fb9214d1719fbee30a2359e1325e9d0758bab936d55d4fccb0b9159d95c44346b8ba217c83552f2b0dd323144eeff76cf04dc86817f3f0758dc3499db2859e0c590110e84f105963c42871b4bbec0db1df0f5a47a2272e0e", 0x84}, {&(0x7f0000000800)="4993a6143b9b2c117f55a260e56c37be02286da9a1517ece1d9679d693583ff31e6eef16038314f2bef90890d0e8a158b45a4c03abd74cd5", 0x38}], 0xa, 0xd) userfaultfd(0x80800) 00:15:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:10 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x1f, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffd}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000080)={0xfff, 0x2, 0x5, 0xffffffffffff4a27, 0x6, 0x3, 0x2, 0x80000001, 0x0, 0x3, 0x200, 0xffffffff80000004}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r1, 0x540a, 0x4) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400, 0x0) 00:15:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x204) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008916, &(0x7f00000001c0)="295ee1311f8129952207e9ac7c6b16f4776710704de7fa4ec7982839258918befc822c980b865c1a8f8b84f7f61e2a7d032a3284a3f3e1ff6508110048ddfc38bd458edc0f87e0281753bfb4d428a52b1f2a03c3781a8573735a8d45d0ca8fca9b868bc194209191449b419cdda6d845d1b6ca5308376fbc70c16f03126fa2723c6530c0e2bf6b52220c1104b381894cbbfe0719271292a9d4a00d9fa9c4aa6b4f2f26ac47dfe7aee98d578788adc97db4a047c5973d4a2ea850e1dd1ee2e862b1ece9b715ca2f45acc5bab567431f9291dc02164d53739d0d78305327ff1eb5dc3e2971ce19eac341a30d9f8071dcffd933f404d861b8d8eca94191f4cbc7472aa37063a39a0679331854b582f8eb127413cdb9fb1f350a11944191334bae25597890e5197fad59145211bd9841b28320a734fa79676b1215d201d49ea920b30d42d9385aa5662a45f4fadca0a6a85e9a7e140639286cced2f7e9fd39d7f9d7a6d2442c96ed1c45f63273de8318d0948d07d3ef2148e9") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x22, 0x4) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) fchmod(r0, 0x4) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:10 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:10 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x223a}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x2}, &(0x7f0000000100)=0x8) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000280)=0xe) getsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000200)={0x6, 0x5, 0x400}) close(r0) 00:15:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = dup(r0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000040)={0x56, 0xffffffff, 0x5005, {0x100000552, 0x400}, {0xffffffffffffdffa, 0x7}, @cond=[{0x7f, 0xffffffffffffffff, 0x7, 0x200, 0x7d, 0x2}, {0x3, 0x89, 0x1, 0x3, 0x401, 0xffffffff}]}) 00:15:10 executing program 1: r0 = socket$inet6(0xa, 0x20, 0x2000001) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e22, @multicast2=0xe0000002}, {0x307, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x4e22, @multicast1=0xe0000001}, 'veth1_to_team\x00'}) 00:15:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) socketpair(0x4, 0xa, 0x8, &(0x7f0000000000)) shutdown(r0, 0x0) 00:15:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)) ppoll(&(0x7f0000000140)=[{r1, 0x400000}, {r0}], 0x2, &(0x7f0000000080), &(0x7f00000000c0), 0xffffffffffffff5c) shutdown(r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x10100, 0x40) 00:15:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:11 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x4000000000003) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)={0x303, 0x33}, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x40000004e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000080)={'ipddp0\x00'}) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000380)={'filter\x00', 0x0, 0x4, 0x94, [], 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000002c0)=""/148}, &(0x7f0000000240)=0xffffffffffffff3c) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000180)={{0x2, 0x6e21, @multicast1=0xe0000001}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0xa, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6_vti0\x00'}) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='./file0\x00') ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:11 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x422800, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x7, 0x5}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x800, 0x188ea00000000, 0x67}, &(0x7f00000001c0)=0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r3, 0x40045730, &(0x7f00000000c0)=0x9) r4 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000240)=0x21) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:11 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200400) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xd) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={r3, 0x5}, 0x8) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) clock_gettime(0x4, &(0x7f0000000000)) shutdown(r0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) 00:15:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@loopback, 0x0}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}, 0x3e, r2}) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80a00, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f00000001c0)=ANY=[@ANYBLOB="350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000decf5f4ffdcb3546a144d850630895bac54c21b6e2a781637f814052346d026df9"]) 00:15:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000180)={{0x0, @dev={0xac, 0x14, 0x14, 0x1d}, 0x4e20, 0x0, 'lblc\x00', 0x1, 0x6, 0x38}, {@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e24, 0x0, 0x6, 0x100, 0x4}}, 0x44) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) 00:15:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x9, 0x23) 00:15:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) [ 437.512263] IPVS: set_ctl: invalid protocol: 0 172.20.20.29:20000 [ 437.537683] IPVS: set_ctl: invalid protocol: 0 172.20.20.29:20000 00:15:11 executing program 7: r0 = syz_open_pts(0xffffffffffffffff, 0x4000) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x8, 0x400, 0x80000000, 0xfffffffffffffc01, 0x800, 0x401, 0x1, 0x0, 0x7f, 0x400000000000000, 0x5, 0x6}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r1, 0x540a, 0x3) close(r1) 00:15:11 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 00:15:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x400000890f, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x4, 0x2) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/119) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x2, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'veth0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:11 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) r2 = memfd_create(&(0x7f0000000000)='/dev/ptmx\x00', 0x2) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x480000000, 0x4) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) 00:15:11 executing program 4: r0 = socket$inet6(0xa, 0xfffffffffffffffd, 0xffffffffffffffff) r1 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xffffffff, 0x80) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$TIOCSBRK(r1, 0x5427) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet(0x2, 0x8, 0x80000001) getsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000000)=""/35, &(0x7f0000000180)=0x23) sendto$inet(r3, &(0x7f00000000c0)="de5773053c131afbcc2cddd1fe944616810887a3814f12a698bbbffa0416fdbce1547951c3455b1858ef4543691fa44488277c3c7e843a5351a0a57e9ea3d5fece6797801d624f10fc20c8f89db43135d92a0d10c8d6b362c1b18b82ecb4ce62ab3b22e652f6cf2b519557372f466a63b1ea4e9ae58e6ce6f127508d4f0704d859fd00c5d8a0d392cfed3bb2fb20f115bc891b0966068db2a85e08ce50f3b54aeaa6aa4ffd7cfc6bbbf3d8c3115be9a3349ff76ecc", 0xb5, 0x40840, &(0x7f0000000040)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x4000, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0xfffffffffffffcf3) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000300)=0x7, 0x4) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 00:15:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080), &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:12 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x4d011, r0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 00:15:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x80000020000) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'bpq0\x00', @ifru_settings={0xffff, 0x8, @fr=&(0x7f0000000000)={0x4, 0x7f, 0x6, 0x4, 0x9, 0x2, 0x20}}}}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) r2 = accept(r0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f00000002c0)=0x30) recvfrom$inet6(r2, &(0x7f0000000180)=""/26, 0x1a, 0x40, &(0x7f0000000240)={0xa, 0x4e23, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x100000001}, 0x1c) 00:15:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fanotify_init(0x4, 0x0) socket$unix(0x1, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) rt_sigtimedwait(&(0x7f0000000000)={0x8}, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, 0x8) 00:15:12 executing program 7: r0 = dup(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) fstat(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000100)='./file0\x00', r1, r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r3, 0x540a, 0x3) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) close(r3) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000080)={r6, 0x8001}, &(0x7f00000000c0)=0xc) 00:15:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$getregs(0xc, r2, 0x21b, &(0x7f00000000c0)=""/79) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:12 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x501240, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = socket$inet(0x2, 0x3, 0x9) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0xb) 00:15:12 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) syz_open_pts(r0, 0x0) 00:15:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080), &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vcan0\x00', 0x9}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:12 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) pipe(&(0x7f00000015c0)={0xffffffffffffffff}) dup3(r0, r1, 0x0) 00:15:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) 00:15:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080), &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:12 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{}], 0x1) 00:15:12 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$TCSBRK(r1, 0x5409, 0xff) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 00:15:12 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) 00:15:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x0, 0x40) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000001c0)=0x1) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = socket$inet(0x2, 0xa, 0x9a8) sendto$inet(r2, &(0x7f00000000c0)="203fa74c8e897bf42d3b1ba602720d241013a386951153ce5737e4b445906ba35441d1e2d98199a0a9265253a8722a15911af903d34ea2408eb0747e5d394508b886967eee09db115e29c146aa7488ef1bf74f593aaf0801be92967825d7e80bbda7a903bdf600fee40bd3bf11e2aa501e5fbac1adc87db82d6fe61a500269ed911b02ab19636d26011eafbea0a65ceb6ee0c0daca0f799648b1b21ce1826406de1681a9eeab07f0e5e4ed3ae636854edc7577811c06ca15e9fc5dd16641e9bc", 0xc0, 0x4000010, &(0x7f0000000000)={0x2, 0x4e24, @broadcast=0xffffffff}, 0x10) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$TCSBRK(r1, 0x5409, 0xbe) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x4e20, 0x8001, @loopback={0x0, 0x1}, 0x7ff}}, 0x5, 0x4, 0x9, "e92979538bd951a4d291b79055aef640cadbd73a59749949ce2402d3147425b8ed776fc048ddf24c044425af92699d260a4b1919e2505cad598c9e2d769baf509f54ea5cc4a64314ad5af0429c9ac643"}, 0xd8) 00:15:12 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000000)={0x100000001, 0x20100000, 0x4000, 0x7, 0x7ff, 0x3, 0x4, 0x1f, 0x7, 0x9}, 0x10) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x80200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_netfilter(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000020}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x240, 0x0, 0x9, 0x400, 0x70bd2c, 0x25dfdbff, {0x7}, [@typed={0x8, 0x90, @uid=r3}, @generic="2a88f8c6b2eef068050d6be5a4c20084b73f4ff1eb1ebbc7b4174bcab13adcd5275f0062cf8aef560d4e165b25f4afec42180ddffe75a157d4291eb597c78b45cf61364276baba642a7cb0dca2b4cc6bf0150f6560058025539312633ae7682ffdc6190f238797457e6ed2638490bae093c00bb7ed75b445bc9d6707e97da4f198466e0aa5beda7c0eb2ce9e2c848d0e79b75c355991af6ab0fbcb0f7e7048e1b4aee339080eb1637177926179b850f9abdc2786f719aa93", @nested={0x4c, 0x6, [@generic="0e49563da528e18f2340ca8b8242d3efe95dc4a5f147fb189238728edd37bca733e14faac395fc1f23e95122783390a66bd71df26e6d1cd4267b49710a755bcb91793f4d6550da"]}, @nested={0x54, 0x79, [@generic="f310ce32b9bd73c25ecf876a42e5c028b866603112f0908f3615c163c70a22f580ed0266ec39d826b32ae2304077fd76cdc4d5704756f4cca99ac5bac6a6", @typed={0x8, 0x9, @fd=r1}, @typed={0x8, 0x10, @ipv4=@loopback=0x7f000001}]}, @typed={0xc, 0x40, @u64=0x4}, @typed={0x8, 0x34, @fd=r1}, @nested={0x4, 0x11}, @nested={0xb4, 0x3c, [@generic="562e93b2489704191c3eb8593f92edf409c0502ba8e15989d07b8ad263a2ce11c6e430bee961ed36d1f723afe9dc575af42db67888e5890fd7e3e9d8be03460c7851f4f84b417ff6e2b30f65debc4ab374cff5cfff0b4a87eecdb97c0e82a2c71184b8d4f77cf691500e0a38dd1f4b494b4f768cfec4af925107e96fa6d2439452a16aee6ea84d80af8925c8b7f721b58b5d2dc53ced9d0ca681b78e1ce9f1c1f7ae4ff0eb4ec4a58d7ae56a103a"]}]}, 0x240}, 0x1, 0x0, 0x0, 0x8000}, 0x200040d1) close(r0) 00:15:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(0xffffffffffffffff, 0x2) 00:15:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000000)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xbf4d}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e23, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x101}}}, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001040)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xf0ffffffffffff}}}, 0x24f}, 0x1}, 0x0) 00:15:13 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0xcf11, &(0x7f0000000000)="3cf536e862254fa6f41070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x40) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000080)) 00:15:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x644040, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x41}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x48, r2, 0x21, 0x70bd2d, 0x25dfdbff, {0xd}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x8cc5775fcb61824) r3 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:13 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) ioprio_set$pid(0x1, r1, 0x73) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000280)=0xe) capget(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000100)={0x6, 0x2, 0x100, 0x5, 0x4f5f, 0x3}) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xe1, 0x100) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000140)={'tunl0\x00', {0x2, 0x4e24, @broadcast=0xffffffff}}) ioctl$TCXONC(r0, 0x540a, 0x3) close(r2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80042, 0x0) 00:15:13 executing program 6: ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000000)) 00:15:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockname(r0, &(0x7f0000000640)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, &(0x7f0000000a40)=0x80) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r3, 0x280080) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) 00:15:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x22) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000680)=""/4096, &(0x7f0000000080)=0x1000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000001c0)={r3, 0x2}, 0x8) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000240)=""/64) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:13 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000e) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f467776710") r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x10000) r2 = getpgid(0xffffffffffffffff) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0xa8ec, 0x6, 0x100000001, 0x4, 0x7, r2}) r3 = socket$inet(0x2, 0x3, 0x9) r4 = dup(r0) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000140)={0x0, r3}) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$inet6_buf(r0, 0x29, 0xd2, &(0x7f0000000380)="ab6d3b29a068277b805257dd5276559cea8385d330d8808805b3ef99fcbf028f9539b20b40e0dfaa22f0510b5fc0689455dd3dac13b39f45fad5a02410abb5e47d6ac829e0389f516f30a4a14b1ff89c8b765cf33e8c013149ea0be9e88076849af5bb2011920cf96e316c62861fd7338f9b57f6933edd5f7acfede6ffa000", 0x7f) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x84000010}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, r5, 0x308, 0x70bd25, 0x25dfdbfc, {0x5}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x10}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x2}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000}, 0x20000080) 00:15:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x72}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0x1d, "837227341d94566518428eb284890462cf49524ee44f38b2161f427c59"}, &(0x7f0000000100)=0x25) 00:15:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:13 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000000)) 00:15:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000000c0)=""/235) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = socket$inet(0x2, 0x3, 0x9) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0xfffffffffffffe87) 00:15:14 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) open(&(0x7f00000036c0)='./file0/file0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000003f80)) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) 00:15:14 executing program 3: r0 = semget(0x1, 0x2, 0x4) semop(r0, &(0x7f0000000080)=[{0x4e99e668cac95f56, 0x2, 0x1000}, {0x2, 0x7}], 0x2) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000040), 0x4) set_thread_area(&(0x7f00000000c0)={0x4, 0x100000, 0x6000, 0x8, 0x8, 0x8, 0x1, 0x9, 0x7ff, 0x7fff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "000000000000eb0000000000001000"}) 00:15:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f00000001c0), 0x2, &(0x7f0000000080)={r3}, &(0x7f0000000200)={0x4}, 0xfffffffffffffc84) getdents(r0, &(0x7f00000000c0)=""/24, 0x18) shutdown(r1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000100)={'bridge_slave_1\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) 00:15:14 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000080)={0x3c, {{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x1f}}}}, 0x88) 00:15:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x800}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={r1, 0x4, 0x2, [0x5478, 0x9]}, 0xc) r2 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) mq_open(&(0x7f00000000c0)='wlan0,md5sum%\x00', 0x0, 0x8, &(0x7f0000000100)={0x6, 0x200, 0x8, 0x100000001, 0x3dd, 0x7fffffff, 0xffff, 0x5}) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) pwrite64(r0, &(0x7f0000000000)="af29d1c5e1145446d20dad5e93c8bc1a50dd7e5dd06ac768a00608b618a4dfc90d2f495199ca7793f62a9678570593b3b724441dec31f39d3b0a011d8bafe1b70826ea694bcd815572d61b37ec1022", 0x4f, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000240)={'team_slave_1\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) 00:15:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x240, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x6, 0x8200, 0x4, 0x3, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x3f, 0x1ff, 0x8002, 0x7, 0x4, 0x80000001, 0x1, 0xffffffff, r2}, 0x20) r3 = socket$inet(0x2, 0x3, 0x9) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000140)={0x0, @broadcast=0xffffffff, 0x4e22, 0x3, 'lblcr\x00', 0x10, 0x6, 0x69}, 0x2c) 00:15:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockname(r0, &(0x7f0000000640)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, &(0x7f0000000a40)=0x80) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r3, 0x280080) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 440.714745] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:20002 00:15:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)=')p\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair(0x5, 0x7, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$inet6(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) setsockopt$inet_tcp_buf(r2, 0x6, 0xb, &(0x7f00000001c0)="5b673a205f2c137fae9969cad7d6cb83259da53e5739a00b82841a3fcbe1827a75429c7254e62a6771e5e350ed9136d2444d2ad27ca75fc986cc44faf78809c1b5d9cba6e30154226413f07056b3facdcaae1717c8a1ce82302f834a4b6b4e3e85bf5760cfd45e7031b37ed9287ef92aca49a29538463f07bb868bbe5f477806c3807e9c3d76f937f9a7d143d947f5cfb3623ec3a2717e4e625e22d1bef853843f1f92dd44502fa462f998919b8b32b22d6e5bf336e830f4dbe72ab86cdc6906d0c9179a0079d660c7ae32280acd8c0e95b2520900ac431c9aaacef438eb0fe01eff1263", 0xe4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000380)={0x0, 0x8, 0x5, 'queue1\x00', 0x4452a89e}) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl(r2, 0x5c1, &(0x7f0000000100)="0727d25b5a7f515f9c0e97cd7a") 00:15:14 executing program 3: getpgid(0x0) r0 = eventfd2(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 00:15:14 executing program 6: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0), 0x80000002) 00:15:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x10001, 0x2001) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000880)=0x4, 0x8) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r4, 0x3, 0x1, 0x7ff, &(0x7f00000003c0)}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000680)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xe8) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000800)={0x0, @multicast2, @rand_addr}, &(0x7f00000008c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000900)={'team_slave_0\x00', 0x0}) getpeername$packet(r4, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000980)=0x14) recvmmsg(r1, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f00000009c0)=""/238, 0xee}, {&(0x7f0000000ac0)=""/14, 0xe}, {&(0x7f0000000b00)=""/243, 0xf3}, {&(0x7f0000000c00)=""/227, 0xe3}], 0x4, &(0x7f0000000d40)=""/37, 0x25, 0x4}, 0x8}, {{&(0x7f0000000d80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000003040)=[{&(0x7f0000000e00)=""/59, 0x3b}, {&(0x7f0000000e40)=""/68, 0x44}, {&(0x7f0000000ec0)=""/116, 0x74}, {&(0x7f0000000f40)=""/4096, 0x1000}, {&(0x7f0000001f40)=""/18, 0x12}, {&(0x7f0000001f80)=""/186, 0xba}, {&(0x7f0000002040)=""/4096, 0x1000}], 0x7, &(0x7f00000030c0)=""/111, 0x6f, 0x7}, 0x5}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000003140)=""/13, 0xd}, {&(0x7f0000003180)=""/100, 0x64}], 0x2, &(0x7f0000003240)=""/100, 0x64, 0x10001}, 0x3}, {{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f00000032c0)=""/110, 0x6e}, {&(0x7f0000003340)=""/166, 0xa6}, {&(0x7f0000003400)=""/164, 0xa4}, {&(0x7f00000034c0)=""/61, 0x3d}, {&(0x7f0000003500)=""/35, 0x23}, {&(0x7f0000003540)=""/248, 0xf8}], 0x6, &(0x7f00000036c0)=""/152, 0x98, 0x3}, 0x1e708809}], 0x4, 0x40000100, &(0x7f0000003880)={0x77359400}) accept$packet(r3, &(0x7f0000003f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000003c0)=0x14) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000004000)={@multicast2, @loopback, 0x0}, &(0x7f0000004040)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f00000044c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000004480)={&(0x7f0000004080)={0x3e4, r5, 0x101, 0x70bd28, 0x25dfdbfc, {0x2}, [{{0x8, 0x1, r6}, {0x298, 0x2, [{0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x4c, 0x4, [{0x7, 0x401, 0x40, 0x1}, {0x80000000, 0x2, 0xfff, 0x6}, {0x2, 0x1000, 0x1eac, 0x2ebeb63c}, {0x7fff, 0x379, 0x5, 0x2}, {0x900000000, 0x5, 0x5, 0x8}, {0x0, 0x6, 0x7}, {0xaf06, 0x5, 0x8, 0x800}, {0x101, 0x8, 0x8, 0x3}, {0xb1, 0x8, 0xffff, 0xfff}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x80}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9b}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r10}}, {0x8, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r11}}, {0x8, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x19d5}}}]}}, {{0x8, 0x1, r12}, {0x128, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x2}}, {0x8, 0x7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xb76}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x45}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}]}}]}, 0x3e4}, 0x1, 0x0, 0x0, 0x24008080}, 0x40) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f00000001c0)={0x1, @time={0x0, 0x989680}, 0x7, {0x2, 0x71}, 0xfffffffffffffffa, 0x2, 0x4}) shutdown(r0, 0x0) 00:15:14 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r4 = request_key(&(0x7f00000000c0)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000140)='/dev/ptmx\x00', 0xfffffffffffffffb) keyctl$reject(0x13, r3, 0x2, 0x5, r4) close(r0) 00:15:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") bind(r0, &(0x7f0000000000)=@rc={0x1f, {0x1000, 0x7, 0x3, 0x2, 0xff, 0x1f}, 0x8000}, 0x80) r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:15 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f00000043c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000002140)=[{&(0x7f0000001c80)=""/83, 0x53}], 0x1, &(0x7f00000021c0)=""/230, 0xe6}}], 0x1, 0x0, &(0x7f0000001a80)) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x49d0, 0x0, 0x0, 0x0, 0x0, 0x9}) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 00:15:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x200000000009a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @multicast2=0xe0000002}, 0xfffffffffffffed3) r2 = fcntl$getown(r0, 0x9) waitid(0x0, r2, &(0x7f0000000000), 0x4, &(0x7f00000000c0)) 00:15:15 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x3c, 0x0, @ib={0x1b, 0x4, 0x1000, {"b4e82788bcf159dd051e40926668c363"}, 0x7ff, 0x2, 0xcf9}}}, 0x90) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r3 = socket$inet(0x2, 0x3, 0x7ff) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:15 executing program 7: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x100000000, 0x48000) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000000c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4e400, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x20}) r3 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r1, 0x540a, 0x3) close(r1) 00:15:15 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8042, 0x0) ioctl$void(r0, 0x5451) 00:15:15 executing program 3: r0 = inotify_init1(0x0) r1 = dup(r0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) 00:15:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x2c) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000740)={0xffffffffffff0001, 0x81, 0x800, 0x80, 0x5, 0x9, 0x2, 0x4, 0x4, 0x8, 0x9, 0x10001}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x5a8, 0xffffffff, 0x0, 0x0, 0x108, 0xffffffff, 0xffffffff, 0x510, 0x510, 0x510, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x8, 0x1, 0x4}}, @common=@socket0={0x20, 'socket\x00'}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xd}}}, {{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@unspec=@connmark={0x30, 'connmark\x00', 0x1, {0x4, 0x6}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ip={@multicast2=0xe0000002, @loopback=0x7f000001, 0xffffffff, 0xff0000ff, 'ip6tnl0\x00', 'team0\x00', {0xff}, {}, 0x88, 0x1, 0x61}, 0x0, 0x2f0, 0x318, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xd, 0x40, 0x7, 0x1}}, @common=@unspec=@bpf1={0x230, 'bpf\x00', 0x1, @fd={0x2, 0x0, r2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x608) r3 = socket$inet(0x2, 0x3, 0x9) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") fcntl$addseals(r0, 0x409, 0x1) r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:15 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400002, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r1, 0x540a, 0x3) close(r1) 00:15:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) fstat(r2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, 0x0, r3) 00:15:15 executing program 6: r0 = memfd_create(&(0x7f0000000400)='\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 00:15:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockname(r0, &(0x7f0000000640)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, &(0x7f0000000a40)=0x80) r2 = dup(r1) inotify_init() r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) ftruncate(r3, 0x280080) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) 00:15:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r3, 0x40045730, &(0x7f00000001c0)=0x43) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 00:15:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x9, &(0x7f0000000180)="295ee131880200000040349efb0835420a0f94e256ae8d8f7536e921") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:16 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x2000000) r1 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x8, 0x400080) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000340)) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/124, 0x7c}, {&(0x7f00000000c0)=""/111, 0x6f}], 0x2, &(0x7f00000001c0)=""/211, 0xd3, 0x33}, 0x3) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = socket$inet(0x2, 0xa, 0x9a8) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000380)={0x87, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e20, 0x2, 'sh\x00', 0x20, 0x3d5, 0x3a}, 0x2c) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:16 executing program 7: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x20000) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x73, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e24, 0x3, 'dh\x00', 0x8, 0x9, 0x7b}, {@multicast2=0xe0000002, 0x4e21, 0x5, 0x81, 0xfffffffffffffffb, 0x61c}}, 0x44) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000000c0)={0x7aa, 0xde0, 0xfffffffffffff001, 0x6, 0x7, 0x1a, 0x9, 0x6, 0x1, 0x7fffffff}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r1, 0x540a, 0x3) close(r1) 00:15:16 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x856, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) mmap(&(0x7f00009fe000/0x600000)=nil, 0x600000, 0x0, 0x3011, r0, 0x0) 00:15:16 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080), &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x3) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:16 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:16 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$void(r1, 0xc0045878) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffff, 0x101000) openat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8) ioctl$TCXONC(r1, 0x540a, 0x1) close(r0) 00:15:16 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000)=0x1000, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 442.452348] FAULT_INJECTION: forcing a failure. [ 442.452348] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 442.464366] CPU: 1 PID: 22998 Comm: syz-executor5 Not tainted 4.17.0+ #16 [ 442.471317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.480690] Call Trace: [ 442.483327] dump_stack+0x185/0x1d0 [ 442.487000] should_fail+0x87b/0xab0 [ 442.490758] __alloc_pages_nodemask+0x600/0x5cc0 [ 442.495576] ? kernel_text_address+0x34d/0x3a0 00:15:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 442.500199] ? __kernel_text_address+0x34/0xe0 [ 442.504836] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 442.510327] ? __save_stack_trace+0x90d/0xb00 [ 442.514870] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 442.520285] alloc_pages_vma+0x1555/0x17f0 [ 442.524593] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 442.529743] handle_mm_fault+0x44ca/0x7ed0 [ 442.534030] ? kmsan_set_origin_inline+0x6b/0x120 [ 442.538928] __do_page_fault+0xec6/0x1a10 [ 442.543133] do_page_fault+0xb7/0x250 [ 442.546997] page_fault+0x1e/0x30 00:15:16 executing program 6: r0 = socket(0x11, 0x80004, 0x51) llistxattr(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)=""/83, 0x53) rename(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='.\x00') uselib(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000200)=0x983c) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00') ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000002c0)=r1) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) [ 442.550487] RIP: 0010:__put_user_4+0x1c/0x30 [ 442.554910] RSP: 0018:ffff8800ba1cfa08 EFLAGS: 00010297 [ 442.560310] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 442.567605] RDX: ffff8800ba19fa90 RSI: aaaaaaaaaaaab000 RDI: ffffea00045cada0 [ 442.574895] RBP: ffff8800ba1cfae8 R08: 0000000001080020 R09: 0000000000000002 [ 442.582186] R10: 0000000000000000 R11: ffffffff846e32b0 R12: 0000000000000000 [ 442.589477] R13: 0000000080000072 R14: 0000000000000000 R15: 0000000020000000 [ 442.596796] ? n_tty_write+0x1e40/0x1e40 [ 442.600901] ? tty_mode_ioctl+0x44b/0x1570 [ 442.605191] ? __msan_poison_alloca+0x15c/0x1d0 [ 442.609930] n_tty_ioctl_helper+0x183/0xc60 [ 442.614298] n_tty_ioctl+0x2b3/0x5f0 [ 442.618063] ? tty_ioctl+0x25e4/0x2e70 [ 442.621993] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 442.627413] ? n_tty_write+0x1e40/0x1e40 [ 442.631526] ? n_tty_write+0x1e40/0x1e40 [ 442.635640] tty_ioctl+0x274c/0x2e70 [ 442.639415] ? __x64_sys_ioctl+0x280/0x320 [ 442.643705] ? do_vfs_ioctl+0x160/0x24b0 [ 442.647805] ? __x64_sys_ioctl+0x280/0x320 [ 442.652065] ? tty_do_resize+0x230/0x230 [ 442.656149] do_vfs_ioctl+0xcbd/0x24b0 [ 442.660086] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 442.665487] ? __fget_light+0x6a3/0x700 [ 442.669539] __x64_sys_ioctl+0x280/0x320 [ 442.673635] ? ksys_ioctl+0x260/0x260 [ 442.677461] do_syscall_64+0x15b/0x230 [ 442.681384] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 442.686588] RIP: 0033:0x455ab9 [ 442.689806] RSP: 002b:00007f7430cfac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 442.697548] RAX: ffffffffffffffda RBX: 00007f7430cfb6d4 RCX: 0000000000455ab9 [ 442.704838] RDX: 0000000020000000 RSI: 0000000000005419 RDI: 0000000000000013 [ 442.712125] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 442.719416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 442.726713] R13: 00000000004be84f R14: 00000000004cd528 R15: 0000000000000000 00:15:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xc000, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x4, &(0x7f00000001c0)=0x2) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000200)=[{r2}, {r2, 0x200}], 0x2, &(0x7f0000000280)={r4, r5+10000000}, &(0x7f00000002c0), 0x8) shutdown(r0, 0x0) 00:15:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) 00:15:17 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000400)={0x28, 0x0, 0x0, @any=0x2}, 0x10) bind$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @host=0x2}, 0xfffffffffffffd48) 00:15:17 executing program 5 (fault-call:1 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:17 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x6, 0xe844) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:17 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000000)={0x2, 0xff, 0x5, 0x3, 0xffffffff7fffffff, 0xc902}) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$KDENABIO(r1, 0x4b36) close(r0) 00:15:17 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl(r0, 0x10000, &(0x7f0000000140)="295ee1311f16f47767c2959fb18baf8de190e334dd2470281edc1dd5ebcbfa26c595947e1070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 00:15:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$void(r1, 0xc0045878) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffff, 0x101000) openat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8) ioctl$TCXONC(r1, 0x540a, 0x1) close(r0) [ 443.317687] FAULT_INJECTION: forcing a failure. [ 443.317687] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 443.329534] CPU: 0 PID: 23035 Comm: syz-executor5 Not tainted 4.17.0+ #16 [ 443.336453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.345804] Call Trace: [ 443.348391] dump_stack+0x185/0x1d0 [ 443.352024] should_fail+0x87b/0xab0 [ 443.355757] __alloc_pages_nodemask+0x600/0x5cc0 [ 443.360520] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 443.365890] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 443.371342] ? get_page_from_freelist+0xacd1/0xb7b0 [ 443.376366] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 443.381744] kmsan_alloc_meta_for_pages+0x81/0x3b0 [ 443.386680] ? kernel_text_address+0x250/0x3a0 [ 443.391265] ? kmsan_set_origin_inline+0x6b/0x120 [ 443.396121] kmsan_alloc_page+0x82/0xe0 [ 443.400094] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 443.404848] ? kernel_text_address+0x34d/0x3a0 [ 443.409435] ? __kernel_text_address+0x34/0xe0 [ 443.414017] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 443.419467] ? __save_stack_trace+0x90d/0xb00 [ 443.423974] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 443.429346] alloc_pages_vma+0x1555/0x17f0 [ 443.433590] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 443.438706] handle_mm_fault+0x44ca/0x7ed0 [ 443.442943] ? kmsan_set_origin_inline+0x6b/0x120 [ 443.447800] __do_page_fault+0xec6/0x1a10 [ 443.451960] do_page_fault+0xb7/0x250 [ 443.455771] page_fault+0x1e/0x30 [ 443.459230] RIP: 0010:__put_user_4+0x1c/0x30 00:15:17 executing program 6 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 443.463630] RSP: 0018:ffff8800b689fa08 EFLAGS: 00010297 [ 443.468991] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 443.476261] RDX: ffff8800b728fa90 RSI: aaaaaaaaaaaab000 RDI: ffffea0004473ba0 [ 443.483527] RBP: ffff8800b689fae8 R08: 0000000001080020 R09: 0000000000000002 [ 443.490793] R10: 0000000000000000 R11: ffffffff846e32b0 R12: 0000000000000000 [ 443.498060] R13: 0000000080000072 R14: 0000000000000000 R15: 0000000020000000 [ 443.505342] ? n_tty_write+0x1e40/0x1e40 [ 443.509415] ? tty_mode_ioctl+0x44b/0x1570 [ 443.513658] ? __msan_poison_alloca+0x15c/0x1d0 [ 443.518336] n_tty_ioctl_helper+0x183/0xc60 [ 443.522669] n_tty_ioctl+0x2b3/0x5f0 [ 443.526388] ? tty_ioctl+0x25e4/0x2e70 [ 443.530280] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 443.535649] ? n_tty_write+0x1e40/0x1e40 [ 443.539708] ? n_tty_write+0x1e40/0x1e40 [ 443.543770] tty_ioctl+0x274c/0x2e70 [ 443.547492] ? __x64_sys_ioctl+0x280/0x320 [ 443.551827] ? do_vfs_ioctl+0x160/0x24b0 [ 443.555885] ? __x64_sys_ioctl+0x280/0x320 [ 443.560122] ? tty_do_resize+0x230/0x230 [ 443.564183] do_vfs_ioctl+0xcbd/0x24b0 [ 443.568071] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 443.573435] ? __fget_light+0x6a3/0x700 [ 443.577416] __x64_sys_ioctl+0x280/0x320 [ 443.581488] ? ksys_ioctl+0x260/0x260 [ 443.585292] do_syscall_64+0x15b/0x230 [ 443.589191] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 443.594376] RIP: 0033:0x455ab9 [ 443.597563] RSP: 002b:00007f7430cfac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.605271] RAX: ffffffffffffffda RBX: 00007f7430cfb6d4 RCX: 0000000000455ab9 00:15:17 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 443.612537] RDX: 0000000020000000 RSI: 0000000000005419 RDI: 0000000000000013 [ 443.619805] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 443.627069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 443.634336] R13: 00000000004be84f R14: 00000000004cd528 R15: 0000000000000001 00:15:17 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x8000000000009) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) fcntl$setsig(r1, 0xa, 0x32) 00:15:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:17 executing program 7: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='/dev/ptmx\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x5, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r1, 0x540a, 0x3) finit_module(r2, &(0x7f0000000000)='/dev/ptmx\x00', 0x2) close(r1) 00:15:17 executing program 0: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2405, 0xc1) 00:15:17 executing program 5 (fault-call:1 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 443.951842] FAULT_INJECTION: forcing a failure. [ 443.951842] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 443.963680] CPU: 0 PID: 23068 Comm: syz-executor5 Not tainted 4.17.0+ #16 [ 443.970601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.979951] Call Trace: [ 443.982540] dump_stack+0x185/0x1d0 [ 443.986172] should_fail+0x87b/0xab0 [ 443.989895] __alloc_pages_nodemask+0x600/0x5cc0 [ 443.994656] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 444.000026] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 444.005486] ? get_page_from_freelist+0xacd1/0xb7b0 [ 444.010516] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 444.015898] kmsan_alloc_meta_for_pages+0x109/0x3b0 [ 444.020923] ? kernel_text_address+0x250/0x3a0 [ 444.025522] ? kmsan_set_origin_inline+0x6b/0x120 [ 444.030373] kmsan_alloc_page+0x82/0xe0 [ 444.034351] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 444.039112] ? kernel_text_address+0x34d/0x3a0 [ 444.043703] ? __kernel_text_address+0x34/0xe0 [ 444.048289] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 444.053743] ? __save_stack_trace+0x90d/0xb00 [ 444.058255] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 444.063629] alloc_pages_vma+0x1555/0x17f0 [ 444.067876] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 444.072989] handle_mm_fault+0x44ca/0x7ed0 [ 444.077216] ? kmsan_set_origin_inline+0x6b/0x120 [ 444.082065] __do_page_fault+0xec6/0x1a10 [ 444.086234] do_page_fault+0xb7/0x250 [ 444.090037] page_fault+0x1e/0x30 [ 444.093490] RIP: 0010:__put_user_4+0x1c/0x30 [ 444.097879] RSP: 0018:ffff8800b94afa08 EFLAGS: 00010297 [ 444.103239] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 444.110498] RDX: ffff8800ba1bfa90 RSI: aaaaaaaaaaaab000 RDI: ffffea000457c1a0 [ 444.117760] RBP: ffff8800b94afae8 R08: 0000000001080020 R09: 0000000000000002 [ 444.125018] R10: 0000000000000000 R11: ffffffff846e32b0 R12: 0000000000000000 [ 444.132283] R13: 0000000080000072 R14: 0000000000000000 R15: 0000000020000000 [ 444.139554] ? n_tty_write+0x1e40/0x1e40 [ 444.143615] ? tty_mode_ioctl+0x44b/0x1570 [ 444.147862] ? __msan_poison_alloca+0x15c/0x1d0 [ 444.152539] n_tty_ioctl_helper+0x183/0xc60 [ 444.156856] n_tty_ioctl+0x2b3/0x5f0 [ 444.160572] ? tty_ioctl+0x25e4/0x2e70 [ 444.164443] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 444.169788] ? n_tty_write+0x1e40/0x1e40 [ 444.173832] ? n_tty_write+0x1e40/0x1e40 [ 444.177878] tty_ioctl+0x274c/0x2e70 [ 444.181588] ? __x64_sys_ioctl+0x280/0x320 [ 444.185814] ? do_vfs_ioctl+0x160/0x24b0 [ 444.189854] ? __x64_sys_ioctl+0x280/0x320 [ 444.194082] ? tty_do_resize+0x230/0x230 [ 444.198133] do_vfs_ioctl+0xcbd/0x24b0 [ 444.202010] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 444.207373] ? __fget_light+0x6a3/0x700 [ 444.211343] __x64_sys_ioctl+0x280/0x320 [ 444.215397] ? ksys_ioctl+0x260/0x260 [ 444.219186] do_syscall_64+0x15b/0x230 [ 444.223069] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 444.228257] RIP: 0033:0x455ab9 [ 444.231432] RSP: 002b:00007f7430cfac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 444.239120] RAX: ffffffffffffffda RBX: 00007f7430cfb6d4 RCX: 0000000000455ab9 [ 444.246373] RDX: 0000000020000000 RSI: 0000000000005419 RDI: 0000000000000013 [ 444.253635] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 444.260899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 444.268163] R13: 00000000004be84f R14: 00000000004cd528 R15: 0000000000000002 00:15:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x4006, 0x4) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000040)=0x8, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) sendto$packet(r0, &(0x7f00000000c0)="4c8881bb1513fe", 0x7, 0x0, &(0x7f0000000240)={0x11, 0x17, r1, 0x1, 0xfffffffffffffffb, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) sendto$inet6(r0, &(0x7f00000002c0)="04010000008b00ddb8460900ffb25b4802938207d903378039ae5375a41640989029ef0712f29513ff0f0000eb353c72e497f754482c1600000000000000d20000000038246d0000fffba37191744d7e459959e78aa490bf11dbb68e1934052f0000000000005ecf4698176c", 0x6c, 0x0, &(0x7f0000000080)={0xa, 0x200000800, 0x8000000000005, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) 00:15:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:18 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r1) r2 = socket$inet(0x2, 0x3, 0x9) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x40) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=@newtclass={0x70, 0x28, 0x20, 0x70bd2b, 0x25dfdbfe, {0x0, r2, {0xc, 0x8}, {0xa, 0xf}, {0xffe0, 0xffff}}, [@TCA_RATE={0x8, 0x5, {0x9, 0x6}}, @tclass_kind_options=@c_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0xc, 0x2, @TCA_DSMARK_MASK={0x8, 0x4, 0xfffffffffffffffe}}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x24, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xa12, 0x2, 0x80, 0xff, 0x8, 0x1ff}}, @TCA_CBQ_RATE={0x10, 0x5, {0x700, 0x2, 0x433dac7d, 0xcf, 0x9}}]}}]}, 0x6f}, 0x1, 0x0, 0x0, 0x4040800}, 0x20000000) r3 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x800) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f00000002c0)={0x2, 0xfffffffffffffff7, 0x800, 0x0, 0x8001, 0x100}) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r4 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f00000003c0)={{0x3, 0x4, 0x80000001, 0x6, '\x00', 0x7}, 0x1, [0x5, 0x800, 0x80, 0x2, 0x400, 0xa2de, 0x4, 0x31b, 0xfffffffffffffffa, 0xffffffffffffffff, 0x1, 0xfffffffffffffffe, 0xa9f, 0x4, 0x790d, 0x400, 0x1f, 0xff, 0x0, 0x7fffffff, 0x100000001, 0x100, 0x1ff, 0x41, 0x6, 0x2, 0x3, 0x7, 0x28, 0x2d, 0x1f, 0x81, 0x2, 0x5, 0x62, 0x81, 0x8, 0x19b8, 0x7fff, 0x4fd4, 0xfffffffffffffffd, 0x6, 0xaa2, 0x49c, 0x100, 0x72c, 0x1, 0xffff, 0x200, 0x100, 0x9, 0x1, 0x0, 0x3848, 0x5, 0x80, 0x5, 0x7fff, 0x0, 0x3, 0x3, 0x0, 0x74d0, 0x3f, 0x8, 0x9, 0x4, 0x9, 0x4d, 0x80000001, 0xfffffffffffffffd, 0x4, 0x8, 0x5, 0x4, 0x1, 0x1, 0x6, 0x81, 0x7fffffff, 0x109c000000000, 0x58, 0x8001, 0x5, 0x3, 0x1, 0x7, 0x40, 0x7, 0xa043, 0x4, 0xffffffff, 0x10001, 0x6, 0x9, 0x3736, 0x2, 0x8, 0x7, 0x2, 0x4, 0x7ff, 0x6, 0x100, 0x5, 0x1c, 0x1, 0x794a, 0x9, 0xfffffffffffffff8, 0x0, 0x80000000, 0xffff, 0x39ad, 0x101c, 0x6, 0x10, 0x1, 0x2, 0x7ff, 0xb6, 0x9, 0x0, 0x2, 0x40, 0x9, 0x6, 0xd8c], {r5, r6+30000000}}) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:18 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() getgroups(0x4, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) setgroups(0x5, &(0x7f00000002c0)=[r2, r3, r4, r5, r6]) ioctl$TCXONC(r0, 0x540a, 0x800) close(r0) 00:15:18 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = socket$inet6(0xa, 0x7, 0xffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f0000000140)={@mcast2={0xff, 0x2, [], 0x1}, r4}, 0x14) shutdown(r0, 0x2) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x140, 0x0) ioctl$TIOCCONS(r5, 0x541d) 00:15:18 executing program 5 (fault-call:1 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 444.687713] FAULT_INJECTION: forcing a failure. [ 444.687713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 444.699740] CPU: 1 PID: 23091 Comm: syz-executor5 Not tainted 4.17.0+ #16 [ 444.706690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.716145] Call Trace: [ 444.718776] dump_stack+0x185/0x1d0 [ 444.722446] should_fail+0x87b/0xab0 [ 444.726206] __alloc_pages_nodemask+0x600/0x5cc0 [ 444.731021] ? kmsan_set_origin_inline+0x6b/0x120 [ 444.735916] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 444.741337] ? page_counter_try_charge+0x4af/0x5c0 [ 444.746320] ? mem_cgroup_try_charge+0xa80/0xf00 [ 444.751131] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 444.756547] ? try_charge+0x2512/0x2d20 [ 444.760590] ? __msan_poison_alloca+0x15c/0x1d0 [ 444.765296] alloc_pages_current+0x6b1/0x970 [ 444.769774] pte_alloc_one+0x56/0x100 [ 444.773625] do_huge_pmd_anonymous_page+0xefa/0x2540 [ 444.778776] handle_mm_fault+0x44ca/0x7ed0 [ 444.783059] ? kmsan_set_origin_inline+0x6b/0x120 [ 444.787961] __do_page_fault+0xec6/0x1a10 [ 444.792173] do_page_fault+0xb7/0x250 [ 444.796017] page_fault+0x1e/0x30 [ 444.799503] RIP: 0010:__put_user_4+0x1c/0x30 [ 444.803920] RSP: 0018:ffff8800b7bffa08 EFLAGS: 00010297 [ 444.809316] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 444.816608] RDX: ffff8800b7b9fa90 RSI: aaaaaaaaaaaab000 RDI: ffffea00044e7fa0 [ 444.823901] RBP: ffff8800b7bffae8 R08: 0000000001080020 R09: 0000000000000002 [ 444.831198] R10: 0000000000000000 R11: ffffffff846e32b0 R12: 0000000000000000 [ 444.838494] R13: 0000000080000072 R14: 0000000000000000 R15: 0000000020000000 [ 444.845812] ? n_tty_write+0x1e40/0x1e40 [ 444.849916] ? tty_mode_ioctl+0x44b/0x1570 [ 444.854206] ? __msan_poison_alloca+0x15c/0x1d0 [ 444.858953] n_tty_ioctl_helper+0x183/0xc60 [ 444.863328] n_tty_ioctl+0x2b3/0x5f0 [ 444.867097] ? tty_ioctl+0x25e4/0x2e70 [ 444.871035] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 444.876452] ? n_tty_write+0x1e40/0x1e40 [ 444.880564] ? n_tty_write+0x1e40/0x1e40 [ 444.884681] tty_ioctl+0x274c/0x2e70 [ 444.888457] ? __x64_sys_ioctl+0x280/0x320 [ 444.892745] ? do_vfs_ioctl+0x160/0x24b0 [ 444.896852] ? __x64_sys_ioctl+0x280/0x320 [ 444.901121] ? tty_do_resize+0x230/0x230 [ 444.905209] do_vfs_ioctl+0xcbd/0x24b0 [ 444.909146] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 444.914533] ? __fget_light+0x6a3/0x700 [ 444.918573] __x64_sys_ioctl+0x280/0x320 [ 444.922666] ? ksys_ioctl+0x260/0x260 [ 444.926495] do_syscall_64+0x15b/0x230 [ 444.930427] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 444.935639] RIP: 0033:0x455ab9 00:15:18 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='stat\x00\x00\x00') rt_sigaction(0x1, &(0x7f0000000000)={0x5}, 0x0, 0x8, &(0x7f0000000040)) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x2ef, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e21, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0x945}}, 0x1}, &(0x7f0000000580)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000005c0)={r1, 0xfffffffffffffffd}, &(0x7f0000000600)=0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) socket$netlink(0x10, 0x3, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)=0x56, 0x4) r3 = syz_open_pts(r2, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000180)={r0, 0x0, 0x6, 0x4, 0x1}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r2, 0x540a, 0x3) close(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) setuid(r4) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000640)=0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) getpriority(0x2, r5) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x3c, &(0x7f0000000240)=[@in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x15}, 0x30f}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r6, 0x10001}, 0x8) 00:15:18 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x33, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e23, 0x2, 'rr\x00', 0x21, 0x2, 0x2c}, 0x2c) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 444.938845] RSP: 002b:00007f7430cfac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 444.946588] RAX: ffffffffffffffda RBX: 00007f7430cfb6d4 RCX: 0000000000455ab9 [ 444.953881] RDX: 0000000020000000 RSI: 0000000000005419 RDI: 0000000000000013 [ 444.961166] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 444.962387] IPVS: set_ctl: invalid protocol: 51 172.20.20.187:20003 [ 444.968450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 444.968469] R13: 00000000004be84f R14: 00000000004cd528 R15: 0000000000000003 00:15:19 executing program 0: unshare(0x40000000) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2800000010005fba0000000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}, 0x1}, 0x0) 00:15:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") write$binfmt_misc(r0, &(0x7f0000000000)={'syz1', "14e97ac6c3319b09fc424337bd3a8a2d8d72ed6b6b318bf232c6d1d9ab9d84ec7858cb9cd2fdc722242f3e0311e5ff69b990a7cd1ebd1184834bb287184641c11b26e55ee8894ec91a53e49c95da959f5564f5ae411c6e5f4bbb7beb"}, 0x60) r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:19 executing program 7: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000080)=0x5, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x1a) close(r1) 00:15:19 executing program 5 (fault-call:1 fault-nth:4): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 445.124530] IPVS: set_ctl: invalid protocol: 51 172.20.20.187:20003 [ 445.154419] IPVS: ftp: loaded support on port[0] = 21 00:15:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x4e22, @rand_addr}}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000100)={0x9, 0x5dc, 0x7fff, 0x4ca, 0x5, 0x1}) [ 445.329146] FAULT_INJECTION: forcing a failure. [ 445.329146] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 445.340998] CPU: 0 PID: 23126 Comm: syz-executor5 Not tainted 4.17.0+ #16 [ 445.347920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.357267] Call Trace: [ 445.359858] dump_stack+0x185/0x1d0 [ 445.363498] should_fail+0x87b/0xab0 [ 445.367220] __alloc_pages_nodemask+0x600/0x5cc0 [ 445.371976] ? get_page_from_freelist+0x5ad/0xb7b0 [ 445.376910] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 445.382277] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 445.385268] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 445.387727] ? get_page_from_freelist+0xacd1/0xb7b0 [ 445.387746] ? update_load_avg+0x1bd6/0x2cc0 [ 445.387769] ? kmsan_set_origin_inline+0x6b/0x120 [ 445.387783] ? __msan_poison_alloca+0x15c/0x1d0 [ 445.387802] kmsan_alloc_meta_for_pages+0x81/0x3b0 [ 445.387827] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 445.425463] ? __switch_to+0x2b3/0x420 [ 445.429361] ? kmsan_set_origin_inline+0x6b/0x120 [ 445.430381] IPVS: ftp: loaded support on port[0] = 21 [ 445.434203] ? __msan_poison_alloca+0x15c/0x1d0 [ 445.434223] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 445.434239] ? memcg_kmem_charge+0x703/0xa40 [ 445.434254] kmsan_alloc_page+0x82/0xe0 [ 445.434269] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 445.434292] ? kmsan_set_origin_inline+0x6b/0x120 [ 445.458136] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 445.462607] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 445.462623] ? page_counter_try_charge+0x4af/0x5c0 [ 445.462638] ? mem_cgroup_try_charge+0xa80/0xf00 [ 445.462655] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 445.462668] ? try_charge+0x2512/0x2d20 [ 445.462696] alloc_pages_current+0x6b1/0x970 [ 445.504614] pte_alloc_one+0x56/0x100 [ 445.508421] do_huge_pmd_anonymous_page+0xefa/0x2540 [ 445.513537] handle_mm_fault+0x44ca/0x7ed0 [ 445.517769] ? kmsan_set_origin_inline+0x6b/0x120 [ 445.522623] __do_page_fault+0xec6/0x1a10 [ 445.526775] do_page_fault+0xb7/0x250 [ 445.530578] page_fault+0x1e/0x30 [ 445.534028] RIP: 0010:__put_user_4+0x1c/0x30 [ 445.538432] RSP: 0018:ffff8800b684fa08 EFLAGS: 00010297 [ 445.543797] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 445.551064] RDX: ffff8800bb81fa90 RSI: aaaaaaaaaaaab000 RDI: ffffea0004471da0 [ 445.558326] RBP: ffff8800b684fae8 R08: 0000000001080020 R09: 0000000000000002 [ 445.565587] R10: 0000000000000000 R11: ffffffff846e32b0 R12: 0000000000000000 [ 445.572845] R13: 0000000080000072 R14: 0000000000000000 R15: 0000000020000000 [ 445.580102] ? n_tty_write+0x1e40/0x1e40 [ 445.584155] ? tty_mode_ioctl+0x44b/0x1570 [ 445.588456] ? __msan_poison_alloca+0x15c/0x1d0 [ 445.593125] n_tty_ioctl_helper+0x183/0xc60 [ 445.597427] n_tty_ioctl+0x2b3/0x5f0 [ 445.601123] ? tty_ioctl+0x25e4/0x2e70 [ 445.604996] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 445.610359] ? n_tty_write+0x1e40/0x1e40 [ 445.614414] ? n_tty_write+0x1e40/0x1e40 [ 445.618454] tty_ioctl+0x274c/0x2e70 [ 445.622152] ? __x64_sys_ioctl+0x280/0x320 [ 445.626368] ? do_vfs_ioctl+0x160/0x24b0 [ 445.630408] ? __x64_sys_ioctl+0x280/0x320 [ 445.634621] ? tty_do_resize+0x230/0x230 [ 445.638658] do_vfs_ioctl+0xcbd/0x24b0 [ 445.642526] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 445.647866] ? __fget_light+0x6a3/0x700 [ 445.651831] __x64_sys_ioctl+0x280/0x320 [ 445.655879] ? ksys_ioctl+0x260/0x260 [ 445.659664] do_syscall_64+0x15b/0x230 [ 445.663542] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 445.668708] RIP: 0033:0x455ab9 [ 445.671872] RSP: 002b:00007f7430cfac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.679560] RAX: ffffffffffffffda RBX: 00007f7430cfb6d4 RCX: 0000000000455ab9 [ 445.686806] RDX: 0000000020000000 RSI: 0000000000005419 RDI: 0000000000000013 [ 445.694051] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 445.701302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 445.708547] R13: 00000000004be84f R14: 00000000004cd528 R15: 0000000000000004 00:15:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000140)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x10b, 0x80000001, 0x1, 0x207, 0x2d8, 0x6, 0x58, 0x100000001}, "8e4f52b169e7bd8eecd52950fd72466593161e303cd6ff3106474b726fed499ab5c8c4bd5c7ff037f2880f0ee6a1a67703d20ee6312bed9ee5a1fd22ab5d2706a3bcabb6f1459d2f1bfcdd9a90cc426b1a26f02c832fcc87cc4269b89ac00f846ef2189e3ef77f9faa3ea36ed1fc9d2f35a11c32c3c764e65c42d2c8d2992534f300c526c40bd8de5ff9b795e832384d88ae5481aaf9c4c30f95ad677be53ead", [[]]}, 0x1c0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) shutdown(r0, 0x0) 00:15:19 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000025c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002600)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000002700)=0xe8) r5 = getegid() r6 = gettid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002740)={{{@in6=@ipv4, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000002840)=0xe8) fstat(r0, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = fcntl$getown(r0, 0x9) syz_open_dev$sg(&(0x7f0000002a40)='/dev/sg#\x00', 0x8001, 0x201) r10 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002e80)={0x0, 0x0, 0x0}, &(0x7f0000002ec0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002f00)=0x0) lstat(&(0x7f0000002900)='./file0\x00', &(0x7f0000002f80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000005540)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002500)=[{&(0x7f0000000140)="7757455435339846ba0e9290914f97b9451d0c61436030e576915bf0e27b614a6fc27789072c0ceab6399e3e66cec723743e076d8f0969ddaabab3f15f7aa843a0e677b90c26cfbe2266a3faed9e90a1061327091936b251d90b136d23855f775926b8250937697f86456a0deeb105ae6a", 0x71}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="26be54231a9352c86a9c1ccd2e12fe7f20d468ba873ef7e65a93a2054a69f9f2a94e609ce6be8642ec6508e831c01e5fcd8b70deeb7bfd9a0d364902b4d2b460ab101b7f15810c93f3f964134326ed534d78f8ef7736b17c99efd774f8809714fe66d2651d48a75a73af5fd30ea24d", 0x6f}, {&(0x7f0000000040)="6d9dcafa453d5e7aa29d1731fc", 0xd}, {&(0x7f0000001240)="b7a12f93337c6a7c26fa82a68099074af67f3aab353ad6ea53551623c4d9a2e87e19133d7c0e082182437356801d54b48d96359bc82b47fd0d583120e97cc59fd6c8b14a26e85940df5452dedd2ed8cb509de01eed248bcf3b653be4e01a0d72c8d6f90e4fd9f3142d42cd454f5df7d5fb9379205c4b4ff195d5fcbd2fb91932522e0bb6fa55af7b06707504f312bec0f7410afac47fe3e7ba0bb1d99afa73c4d1f4065badb65a52c2db9345c5f0c46f5b3672089f39fb6213077deff9e955953ddc025dfed22e46b2a8249eb6a69d2e173486c33269c1875aaa720b9c04d9dd8f60c92fd3400fda921032e4397c2f31e622bbb0df3a3f0c499f5c587b41a4d1c8dfc07a52d45066d045904d207a68a3d44453b62df993178e517c0391b253f9513ab0ead2fba8e0d91593cc17ee6981a82cad0e02528a6e28f065ee0bf1070e8743af9e7f68958317ab8d551939409a6af61991cb69437aecfb1a9b09a88d83a5ed2578e1f61a5d0dd1cc7acd25c4050f1337500cad9218edd92c8a1a48957ff67dc51b7b4f98052e902a21b9fbf3b284fd0f820629116c0f691cb8658c26e67fdee88fdc47ac4e0c94427298cf09069cb0f38a95314e5f4090bcf109e1f9249d9fc9b580c1c9dfc8732ca563dd25d8ad5f5d83b320ec4ca7bc404f73f516c4ed6b58a15684322b247777a01e9b84f9b2f81b506dca26696e35167c4e326ed98046bfa16f667d2b7251878d1999a0715d38beabf5506f5e9d1a47451fd4da14b4f0c368373a8c8710f265bf2a7e05a1724a2a2820847742d0b18a8c4daf0368e77a92ca57a9adfd1d88c3749058f3157c250ea9e4bcc70f26b5c3be5168bef83c998a4d0d36e56a756fa19a3410f28402e0995ab2b8e06db224f59053700e421f2350b35e14cf145c612faca76efd23162c198e47c24da65e60b1149e7f9ac97b3548366a5f69f0c06247fae73d5877845ffdd5b46817e7b34778228da642d1dc95bf426388467ba20ed50c4e01b7f5b717bf2601cfb25fb5c5305c5f7d107807b81558d8639cf3bc1dc0346132b50e06f7661c203a6cec37d551129b915f55eeb853c906c81ce845027bdb6d13a1ca10f34f5edb6ac99033ef4181766e2ede4d5f96bc7e24962106c1b9feecbd03f2483bb3f5d2f9c2e73182fe01c4035c95013b79fd68305e0a520295c4097ce1e98ba32a710596b6f79c79e13fb5352abbf43d9f617e34229854b602e338b90b933c9050b847a14d73bbf173334d880a44beb2ca6b565b98b98346f10c7fbdf1b66fcc315306e983f805c24f3a9eaf7d8467c6cb98f7dd466552ebb5cb4ede1905c095c7139faeda56ecdbfd51a275c0fe64aad8decbcec525b880c2464751ac51e513e5cbf0f6a13454ce98ef54e480ae727c333b769ad5e0f0dfe6e957522f9476163b1b81e9cfab5cd9d626c1881935ecee874364cc8878807948eae1a597fb05e143e8fa55275d7902f384bd66373e6ad9a9d020a44a91035f95a45f9c47dc3dabe24adc6a703ede46102df30282f05da0dc0a790425e65ea9231c9d48fd0e8d1d8ce7c88e9acd40687fe3f7785661304a4499d882c228482407fad856a788f4b2e894b1ee92c0b29cfb22b813cec084fff987f2d3285d6621b09db152297c8ee8daeaefcd9d686a0dd33ebc8325d930019788fdb3e6a080c837e09391c4faa97570b054beec6c1a15aa07330cd6569e4ae2d44984194fc58e76326195f9c2defd048a97ac3b7849ad1015b65693cb7435c744e0bf0afe95847b405e510797db8b0b7afdc3403340a2f48568f21caacabe4da67bebda900da4d3bd631aff9e95e9c43bab7bb33cc0f99bd59023777390c423a77140d0c96c4e0f4285755bef5529ffaaa0d204005633bcf4216f154f945304bbad795e2c5c9f7b725fa91088e8c4bdfc44e6f05cbcafbbbfadfc9debc7e1e693afe577e0cfbb44ecf7994366557fa81f04a112f6188aa67e690734f5e78a6f66b9480f99816c9be7dfbb0516fb37f5cb81b5bb59e0642375a10ee82bb808e6421b4ed7f06a00d2dcba9d6cb07c5b739c1fb3aa831a6108ed15be4cb93749d6eee5775640231df8e3c13fa013e6ee02297696f8d54038c1c3ba6cd9b875a9685be52f65bfbf3aba90d3a80c0398a589cd2d63b70fc1e5be19f0dcd66f5da72302584429921ff66d426482f7dc3f91d1ec555541c66b0bf57633241863486dc8900971a06cbc823fe3263c755c877690139d13752598053e63260624ce6c8964754575b3f5df3d1d134751048b65d06f85a47d24bb0632c53cfa78dffd776f0721c9cd5e70d604999c6445f8a3cc0ac9e0e8d743f0e2c23f02522ed8ad3ffe4fc8c44e321556ad2e051bb1e371a0cad54cd12987eddf91998eea61ac63b7d8426fcfa69c19020481c0be9e1d764844f0aed1b51b1759e9e4c95410ff9dfac1f44b1ee1dbf3a8225ce043bd46406c20de88dc783709dd1e3fb0f68fff2412df76f5fd9ef45ff6f1d67316e4e968a14f9458288397d0cd92787613f8813c05302d8680130437d8f8c552aab5d780e4cd5778c044b144a8cafda14e3ad9962722661b716ea40754e13d570b2ce7f7604df85f3c45e9ea1acd98f639b908e9924eba71d3a7110aaa13469db52e9eff5a7703623985a9f398d3c2860663fcce49b376ea707e0d325fdaf02956f91774e73baab39d7d091f6a72d92ac0dbb88968f0b23b21b9a1af3ff104c577ae1d2ed73fa8ef9bc94e884912a25075300078c5a48582c52f56e38c5b03f838fbea942775d48655bf0358c8bdc32ebc5c8ae4572ed7a0944995ebd29dd5db629777541ca3e1f9ec31d7f47e4fa0c5e878b22ecbdb8797d0ec11b87678061f6cfba6fb5c08aaf7abb8f8d5c319677781fe0fa1708792afa7ff7302d09f6e331480a9fe9778cc4d392b971f99e0e6db10f66e0fc9bbbc3cef1785d461a0adbee0ef4ebf842a4cdcb26a44e53f16a4f8c3e4e45da0c9a8de8fa204a824d55d6b9e45bda08f1b1be7d58ab6d3f0682c367a8c9dfca67e795ca66318c9ea06152608fe403c5f1ba0cc40b245793d5550234e6f5d5fe2b0ccb4243ee9c5a1a955ff66363740fff9044f4e97df39b57e552bcc9b7c8ab73cb5ed654ebf2ec66626e9a179bc6649342a2a00e9ea5d165297fe7117f961032e969e53b430da5d625a2873b5ff57ef200fbf78d73978ae12a0280a3a45b7526c6ca6471f462da2ac54bc77ccea53f8a02758c157daf1490f07f181185e5dd39e78799e47d1fbd945d925169e7457e561366465c317cdecb468c344131da3c08cc4eb2e151f4041f5c129985637da2fa84398b5262062f3a151a34ee014619ffb20497ba6c93ad71589bbdcac4d86ad3422d0612773d13a9d4c71642082c2d0bca19cfbdac28fcbb6bad6eb510c81cafef639a058a7c193e7a76461e194675ec537113ae5b9995a7bac5c503567bdacda0f08f90e2804923aa08fb96e1fca8eba6ad7f660a1894dfb1b0b596b9bd601bb9eef730e42570288ec2c4d9d470619c01f9ba80e1c4a37067bedf7888ce09daee2341b5cd49a4c378c1b032c3e6848a15c30791987796ab3d817d628681cf6fb5b076f96a88f4044fccaed7745aff77e23ed88183a674c4d0840ec6bac85d2a825cd39a2a09ab99d749681a083cc85bd01caadfbaee96bc290cb5bbb673a47a185b11c06099d8fe2bba9a24b8502b6b63f1385c6de96dbfac1bd9ef4dc706949f2cb02737c8c543e8d0bb9ec4ebe0d3fe4c9d0d5294470a9d060f10d1f1a3b9d0adbc893f95b6fb192cacd5960d63d863be551252c096240a68854b0a11992aaa2e97b7fcbf9b0ff7470413593078655b89fabfdb64dd9efa63ed5770faee5aaa24062ad3392f179319697f66742557a1745528cd82c5d18aff52b8dd9a722b98c604ded875a9f882ac95d54e86e906a62067205227644a237f2513b6d3e614df0aac758533cf7c0dea5b353b21f58ace8c1552fc56ef6662e9e43a9dd8ee422a823d7737550b9e34b7a58e5cdb0b4694679826a7cfdfd14c5e84c81f873ed957d79a1e7735cfc0bea9a06a072b9a6b348cdd06334ab4ae49e32768c9e7da2de0f016b5fb728a6e3eb42d6fd51af0fe1c39112d46e55d22e64a3aa2e43341f44a4498de7a216f9d96c14730fb1dfa6ff8938f0e8d33a5130db2a210534907e801ff00c72881faab3e3f56868114014b2f41d9044b9a20f39ba511d8ebb403ca9251ac61ecff1ea25610a5f5839e06b87479d1a253cff48ac501de7a37832404bb4b79df94d6b14047d11d7bff5386c59cbc7450787e2d64ce47bffc4129449a0725b149a09b4b0e431f0617105fcf8cc25e70a69e1a03713cb37104e2ab3dbf79b5cd09786c7f7e2937b3c8ab0f74e04bd5131f3bdac5735d14302e4c66b5e979d61d55604c834892fc8148ae9401449c5f6932961de0fd423c1c26fbc69b402bab76479f374f047ae8ba9bb3c96fcc5cb9819a6c60376ae23d8ae8283245734affd33b26e27f246c4e5442efac9f1210e52443bd10ed889a5c8d0da49f8812cb0a63ff985631c0cda7e75a607ea47be94a4b6ea0863196b7182e945d87a8a077ef6910cd10de19c45743d6b4cc9802173f6eff062409aba8553187e72747e756210311380abb0da771e77487ab5b97b3105dcc902b0abbb8dd1c178d987e30f434646100037e14abc25b192cc99ea023f1e59cbe8e2a4562307687120eba79a0d87953efcd31a69a9622e78917f2ef23cede9a8c4e3dfa7d7be091531d2b1da640b3fb84e5d3482fe2e98eb5356d5c09e1066f8cc486a6b7c810482c84b8d05f38d4ee765589fed79d614748f15159dc310e629e7e9db1ee5f135874920b8a4e9a20c8ef77fe7c1287bbe7b33378e9ead3267afb06c3cb72e11663ca1e85e6f9bb03ab897cd19c223ab684394f0acc9fa810974a5cf47bb3e500a1424aac857bfff036e13af4605ae477f3bf4e85c4e9891cbff62a33c453fefa381a06b0d246a00dd92065c1907cff862c95e197407ae52f8054ed2dc8c059823abd8f836d86c3d7765e9ad638fb0f63ad2b9ed3ad72cd38bffb30f719c9cdab36cd308420f1c063d29bcd2080560825fa1518b72ee3827acd13d447f6b869106a6aad1cae2a9dae73713d8e85db8af7eff4d9e2b7ca1aa13c69b24a919fdfef2aa809df7481cb2ab70ac7d2d9c5cdef30a7ec118b2ecfef730889c6b6a2589253e286a0cb0fa93a86df0decc6e9a217ce57f982576f61a96c93b4eb4b8042b6084e791ce2b0083896c78e4f56c80439b507db53124652ed99b96a6a13c83e61a25ac49f266815efafde99517f647e80b47aa216f93efd8a5ca72895e6add5cca02604c1c0c4ccc443a2754ea002b831d9e4a928d1c77ae3bafa0dee5bfcfa0d3acc2e04625adee4c7d686bdeb60a7b3f2b9620b6ca7d232780c80319d511993b134d44f5b8cebde05d0d95acb711d9460036532ab5060cf6a069578d8d587901d116cf01d4fe693b2d7dee1ef68afdd9805c634dfbe886a4e9e7bf93752f7a28578631ad6ec3e7bb13fe7d6e663eaf91be436a9f3666767e935251d350a3c44f13f5255b253a823df303a20515cd5302b6bd565c499ee33b6c50d085a42da437aeb83072898235d3e42770d1b3e79d16b4dbbc526c3c667b55b4e35071ed85c5649b0bbb24b2b4153ef435941b12975baa3ac1e7b6776888e2e6c4b4fce77c70556862c65836fc679c495a4b86e69bd8fd3aeeeaca3eb37bf4a6640c181291c0be86a80128cdb167d37cbaa0096a38e3689c6e", 0x1000}, {&(0x7f0000002240)="a6b762f14db0261d06158f64d55e7775ca81913b2f0f08c71d91d42ffba9928e499abd420149dbeba6b55ae66c437894b5e39ffcfc835f5d86bb4260ea8ad7af", 0x40}, {&(0x7f0000002280)="6f8a00597b248fada8b278923cba385feb8e974b4e446b694de145c108da424fe76e23701a0b40f21b64c7857abc3ca49f3b655a5734d30365a19e6714934de7537a38820e8ca6d3faac8888390523851b4f45392e3e53aba3854ce4ac143395fc6e08d089cfb2d9479651d2056f1fe7d628d3e27fac4fe18f4425b3bea823aae49ddb60a0baa538d683144672e14a1fd579c1b3334e1e6462efed8dd8bc73cdc5a2ebfe1250b24620bf8f091aeb4ec71ff4d89bd08d5bade23d74b7cd6656a64cfe7a1df624ef855d8fb18fd52b9fa1b54b8764a66d05125c398545f2674e704b04c48e7ae524e794347c18b6de5a8dd4e597eb4a066f", 0xf7}, {&(0x7f0000002380)="a578f960ef43f19240dbe1422ffd5968054131af849e7374d7f5de10869fcfd83fd22f5db9dd60e0b491b02060dda77c9b253a79d79822acf504d0272be486f352b7f13b80c832440892f3e8b0add5d47c70a03c", 0x54}, {&(0x7f0000002400)="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", 0xfd}], 0x9, &(0x7f00000057c0)=ANY=[@ANYBLOB="2000000000000000010000004000000025125c5a81aa868e67d56bd6a2fc5c2ebcab5317448b60bed996a8b30ea2522ebec9beef442c8c5596e5464d52077b0c8f19cb77521ad1d780eef2779e4dcdfdcb31fc7c1847cb90e27578c68c8a0dcfb374d5707781d9db95898e24fdcf9e1d03662fedc5fcbb1808f342458cc596582340245e32d71bb02cbbc0ef956a233ed94605fd2d8a96e38ac6df44a03eb1bf8d", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="00000000180000000000000001000000010000009677e74bd1688a2a1b3865e2f055dba1ceef152445630b49f57a6199100dd598dba1fc21a0112025e266ef8b23ce04c3da86f7a0480b42d70481e85db858a9482c329022a1093baf2d44cafaf115", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00'], 0xb0, 0x40010}, {&(0x7f00000029c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002e00)=[{&(0x7f0000002a40)}, {&(0x7f0000002a80)="963d28f2f0b656d55d9fa265383107d7002a000ac1a1d4c8de4192ce44dec47a906c69a1454e44897ff24d645651740711f62957f9947160c7a6a1bc74d83d5231bbb1ca5b161932600a7a6ef8921be0", 0x50}, {&(0x7f0000002b00)="eda83e2df0a0da33c4707394481711f8f14ceb272e8a0129f868b9f390b0f3988673609e3e7f9c2585e75390fb972351453bfd9a89e62b9335e5e558f61fc9e2f6a80a22ce204dc8d4f576f0b6cceed67f4409f43b6b1bd91f7104fc47066d1c612ce7b76ebdfbc242a1828265966db86cda629d923167fdadec60504bfb7578548e6cd36c8289dbfb52b133289112aff54f442de5e8f79b9560654c9f35027c06e3e4ab0fd53e250fc0915a523c723999e8a031f4630aa96abf613cd6ed3634b8526c96e97a46fc9327cfb909000160c8e84ba2", 0xd4}, {&(0x7f0000002c00)="d6853026a8b46ed53f16f890eb8ca6a57cd5046884b668cff958a71669b6476b4d91a19d38564f93a4fbd986a28423d745811df7b7286f9bfce5b92edd4d66fa5c24", 0x42}, {&(0x7f0000002c80)="c10bdb95ab397c8d5d2788bc757691bd050491b913a8a51bd270b39e00980a540aba73ef2afad3c084a19ee67e5b1710335f7a23bf74a606a2860c7b882e8ad96962620c08ef3a41cc25ef53064b0dcd0f4ea16f41dcb871f0812fab", 0x5c}, {&(0x7f0000002d00)="99bae63b4b2908c21e1a1941596012a76a0d8290d63d5fdda8951a5e23daee7910ba59f8838b9b7ec20b7a29a9ee2e2ace624ab2dc5bb67ad30d3141c82a9b458257ab502fe8fc56966653a6b46a1da552cacfdce81cfdbb0e98d63e72efa01c3d26144ccd2fe07f3c9e539b103283dfd9a742bc2b226c20eccaf0631150b212b06467512cb3bfe60d62d30542ac3e81f1ed6bb9a6e5d0cdedc93cf9598176e7e75528beff6fc5fcf07bcfb116", 0xad}, {&(0x7f0000002dc0)="eff2a73b85866b0115dbc1dca2b108aec2dbe70f790ca2af3d009eaf43d07a45a2557f2d470da4abdbc42ed69ed3fef1f8c90fa34f40f3f7ad1de5", 0x3b}], 0x7, &(0x7f0000003080)=[@rights={0x18, 0x1, 0x1, [r1]}, @rights={0x10, 0x1, 0x1}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x28, 0x1, 0x1, [r0, r0, r1, r1, r1]}, @rights={0x20, 0x1, 0x1, [r1, r0, r1]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r12, r13, r14}], 0xe8, 0x1}, {&(0x7f0000003180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000054c0)=[{&(0x7f0000003200)="31f803e5d71c68cb91b21a1bd75e94524a7a6b43c0fbca9b6fee5a3cdee0dfd6cf81cc388308cd193f3ef4e2f12d9f7203d075ff394f76c2d241beb98d9eec59ceae94c7684d55a941522941a7dc1a88205a6026739f7e0a0fb60e32be01d08de53b1de6f4ecc96c", 0x68}, {&(0x7f0000003280)="5caa5ac582faa5c64d82472ddeb32a5f9e774905fb57536a54f6ae1d0be73f8dd57cdbb29f846267b2fa7518800ef0813712eb3cd9b1dcfa32998d830b11a95f09484825ae8087994df1b724670ebcb9cb5159133dace32288c3ce0164db899fa7bdd1fd684d0f82bc538aa6e00b58c0afe09c7014c65c2839c364079f2d9bd9ea0e1bce619c5c8ff1ef099b10d51bab210000fa273089973cf34b", 0x9b}, {&(0x7f0000003340)}, {&(0x7f0000003380)="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", 0x1000}, {&(0x7f0000004380)="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", 0x1000}, {&(0x7f0000005380)="f12decd665fe89aa5d90537810c808dd746cd27db07736b9815dac29e147f025731c9770f962aa4f287c399bc0bcbd61bd185f080ba16d7acaec36eb764bcc260bb013bd20b21739904ac6956b1242256540a59b75d6a13d9f63699eed80ec75aecb63", 0x63}, {&(0x7f0000005400)="defc3760f6024d51474cb1be6c7c7a2548c56fa87bc2fa3310503b0762c2625daa8a9be826b6e567b139bb0f8631588dce4aa75758600edd8e842c909bb8e4c55b51705c71fd18a5ed3d472459b7ce68cb8ac3909b6b1f95fbb8712de101d748b71513df7a0d994ac52870cae2eb575b4830df061a3b7b2fe962dd2afef9fb07b0e992f4ab73", 0x86}], 0x7, 0x0, 0x0, 0x80}], 0x3, 0x44) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:19 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x10000, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000080)=0x1, &(0x7f00000000c0)=0x2) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={{0x4, 0x80000001, 0x800, 0x80, 0x7fff}}) setsockopt(r1, 0x107, 0xd, &(0x7f0000001000), 0xc5) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000200)=@in6={0xa, 0x0, 0x1}, 0x1c, &(0x7f0000000580), 0x0, &(0x7f0000000680)}], 0x492492492492682, 0x0) 00:15:19 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x5, 0x6, 0x1000}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) ioctl$TCXONC(r0, 0x540a, 0x3) close(r0) 00:15:19 executing program 6: socketpair$unix(0x1, 0x2000000000000004, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) socket$inet(0x2, 0x5, 0x80) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:19 executing program 5 (fault-call:1 fault-nth:5): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 445.964712] FAULT_INJECTION: forcing a failure. [ 445.964712] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 445.976559] CPU: 0 PID: 23161 Comm: syz-executor5 Not tainted 4.17.0+ #16 [ 445.983483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.992827] Call Trace: [ 445.995420] dump_stack+0x185/0x1d0 [ 445.999055] should_fail+0x87b/0xab0 [ 446.002776] __alloc_pages_nodemask+0x600/0x5cc0 [ 446.007533] ? get_page_from_freelist+0x5ad/0xb7b0 00:15:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 446.012469] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 446.017842] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 446.023296] ? get_page_from_freelist+0xacd1/0xb7b0 [ 446.028324] ? update_load_avg+0x1bd6/0x2cc0 [ 446.032743] ? kmsan_set_origin_inline+0x6b/0x120 [ 446.037598] kmsan_alloc_meta_for_pages+0x109/0x3b0 [ 446.042613] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 446.047985] ? __switch_to+0x2b3/0x420 [ 446.051878] ? kmsan_set_origin_inline+0x6b/0x120 [ 446.056720] ? __msan_poison_alloca+0x15c/0x1d0 00:15:20 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) clone(0x0, &(0x7f0000000140), &(0x7f0000000600), &(0x7f0000000080), &(0x7f00000000c0)="97c5edc29687fffb181c05fff2d9d4297134a16bf9bb21980e20e7c3ef47994aeaa62cd3eddca17c16a928815efe936e5a91d68ab7091d7dd5828535a428e402a702") openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x410000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000000)={0x2, 0x80000001}) [ 446.061398] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 446.066762] ? memcg_kmem_charge+0x703/0xa40 [ 446.071171] kmsan_alloc_page+0x82/0xe0 [ 446.075148] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 446.079905] ? kmsan_set_origin_inline+0x6b/0x120 [ 446.084750] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 446.090116] ? page_counter_try_charge+0x4af/0x5c0 [ 446.095048] ? mem_cgroup_try_charge+0xa80/0xf00 [ 446.099813] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 446.105183] ? try_charge+0x2512/0x2d20 [ 446.109176] alloc_pages_current+0x6b1/0x970 [ 446.113598] pte_alloc_one+0x56/0x100 [ 446.117403] do_huge_pmd_anonymous_page+0xefa/0x2540 [ 446.122518] handle_mm_fault+0x44ca/0x7ed0 [ 446.126758] ? kmsan_set_origin_inline+0x6b/0x120 [ 446.131614] __do_page_fault+0xec6/0x1a10 [ 446.135772] do_page_fault+0xb7/0x250 [ 446.139578] page_fault+0x1e/0x30 [ 446.143034] RIP: 0010:__put_user_4+0x1c/0x30 [ 446.147446] RSP: 0018:ffff8800b680fa08 EFLAGS: 00010297 [ 446.152812] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 446.160080] RDX: ffff8800b7b8fa90 RSI: aaaaaaaaaaaab000 RDI: ffffea00044705a0 [ 446.167344] RBP: ffff8800b680fae8 R08: 0000000001080020 R09: 0000000000000002 [ 446.174610] R10: 0000000000000000 R11: ffffffff846e32b0 R12: 0000000000000000 [ 446.181877] R13: 0000000080000072 R14: 0000000000000000 R15: 0000000020000000 [ 446.189160] ? n_tty_write+0x1e40/0x1e40 [ 446.193235] ? tty_mode_ioctl+0x44b/0x1570 [ 446.197482] ? __msan_poison_alloca+0x15c/0x1d0 [ 446.202157] n_tty_ioctl_helper+0x183/0xc60 [ 446.206489] n_tty_ioctl+0x2b3/0x5f0 [ 446.210204] ? tty_ioctl+0x25e4/0x2e70 [ 446.214095] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 446.219457] ? n_tty_write+0x1e40/0x1e40 [ 446.223531] ? n_tty_write+0x1e40/0x1e40 [ 446.227620] tty_ioctl+0x274c/0x2e70 [ 446.231339] ? __x64_sys_ioctl+0x280/0x320 [ 446.235574] ? do_vfs_ioctl+0x160/0x24b0 [ 446.239632] ? __x64_sys_ioctl+0x280/0x320 [ 446.243865] ? tty_do_resize+0x230/0x230 [ 446.247922] do_vfs_ioctl+0xcbd/0x24b0 [ 446.251808] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 446.257173] ? __fget_light+0x6a3/0x700 [ 446.261154] __x64_sys_ioctl+0x280/0x320 00:15:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 446.265241] ? ksys_ioctl+0x260/0x260 [ 446.269046] do_syscall_64+0x15b/0x230 [ 446.272947] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 446.278135] RIP: 0033:0x455ab9 [ 446.281317] RSP: 002b:00007f7430cfac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 446.289027] RAX: ffffffffffffffda RBX: 00007f7430cfb6d4 RCX: 0000000000455ab9 [ 446.296291] RDX: 0000000020000000 RSI: 0000000000005419 RDI: 0000000000000013 [ 446.303553] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 00:15:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) timer_create(0x2, &(0x7f0000000280)={0x0, 0x29, 0x3, @thr={&(0x7f0000000100)="3ef65ef6be8095d5eb119661fb994fafd0905991cf55ce14db3f9de5df9866fd4365de003acaa7cb5204921e961836593e768de1cf9e2b355752953f48650e67a40d351138e582c0127962189bd2206c612da8738bbdf5a694fa8d36a2a6380c98c675606322469eefe5fe486aef0652284e4f64f8a4034b0d3916b3a18eb7809ba10a20a2a06cffb74b7c83fbbd9200d58ffe139964c03e131c7d2eaa21d5ba3510a96f966f2f1a547a9988cbca7315ffe9e6928c24b163f7d11021a4f178a619a7981be80b1e0de69772ff283ec9d8f9f161ad9b79fc5eb7c1dad257982847ab968cdd1b6e689d6cc4345cda38f9810b", &(0x7f0000000200)="1f7e544405d000562d2f53bd04cb6a3dac190ff21b9fb527c7d5adbf4f900d5337032da022917e19cf6b82278021edb8306e50e2d8bb7eb40c3f1e9ca8dd79007950bc7e51dd9444eef57a50d33a8dc2ff369091f26f0195d36206967851e1787b514c6ac2236724e4ef37"}}, &(0x7f00000002c0)) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1, 0x82000) fcntl$addseals(r0, 0x409, 0x1) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x5, 0x1) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f00003c7ff4)={0x10}, 0x63, &(0x7f0000000000)={&(0x7f0000c07e98)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}, {@in6, 0x0, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}, 0x1}, 0x0) 00:15:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x2fc2, 0x1, 0x7, 0x4}, 0x8) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x4, 0x5, 0x2}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)={r2, 0xd3, "85aab7f0f5fcf905c797db74a0afd4b74ee979eb9e14497cef69f9936c1356521df48986bdd2ba35517065b48b68545ad86ae3717c7826ee1c55e5cc633fc1283034f5976bb382fb2eb8bc4bf549166d188a050be833c90cbab1da0f8d2abc9bab4b98da56eb4ddc511fdb1d4db5439e765e98602a09c8ae7ba27814762481642317dc06949e946a0ddfc0054602ad7866363f58ca674834eb94b6d0e48970d97c2ec1ec5ac173419d854eb739e7166a26ac8eba4ab337bdcd668941c117659aa22969b38ac7f68af0adfa92f303262b0b3058"}, &(0x7f0000000240)=0xdb) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0xff, 0x5f09, 0x9, 0x2, 0x20, 0x6, 0x1c, 0x1, 0xfffffffffffffffe, 0x1}, 0xb) [ 446.310819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 446.318083] R13: 00000000004be84f R14: 00000000004cd528 R15: 0000000000000005 00:15:20 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) r1 = getgid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x3, &(0x7f0000000240)=[r0, r1, r2]) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r4 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockname$inet(r4, &(0x7f0000000000)={0x0, 0x0, @rand_addr}, &(0x7f0000000040)=0x10) 00:15:20 executing program 5 (fault-call:1 fault-nth:6): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={0x0, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:20 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000480)=0x100000001) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000400)=0x2, 0x4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000040)={0x5, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}}, 0x1, 0x6, [{{0x2, 0x4e23, @broadcast=0xffffffff}}, {{0x2, 0x4e22, @rand_addr=0x8}}, {{0x2, 0x4e21, @rand_addr=0xac}}, {{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x3f, @rand_addr=0x200}}, {{0x2, 0x4e21, @broadcast=0xffffffff}}]}, 0x390) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000240)=0xffffffffffffff86) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r2, 0x4) 00:15:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:20 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) getsockopt$inet6_buf(r0, 0x29, 0x3f, &(0x7f0000000100)=""/222, &(0x7f0000000040)=0xde) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) 00:15:20 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}}, {{@in=@multicast1=0xe0000001, 0x0, 0x33}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_proto_private(r1, 0x89e8, &(0x7f00000034c0)="56d6b844688a469717abf697df06c60899331f32ed2940a92f65afb9d59eea9f9dfb36c0d03e39cf36ef5da01e8f81d8204af9311aa6352ec6857337a79b504fdd7ddec7eebd4c6d03493cfa0605d0b37867d7e2eab39bc0c81c0e1374e1863f52c174095ec93df7b08b819116890c2ca96b41543375cd2907259cae6a5d1c70d92e32c6767acc4da3b42e247e05efedf345cb571c418855c195b3ca95214830d20772843f8d8b83e19fd15ca9f547ff803efa812bcc977a7a41813bd699c5a6bdf01804eda1449437d2f0d8035c8a010c948736204d7438dc58dbcb2c26d2cbb42c524768671aef182101e258352cf916f50ef0b678cd4646c89e4efa8c7113a0ccccd761c5a01d69a86c13caa62be751a04508030c0e4a4e88403b865e33519cb385182a850a91d4567ba757f753e78794b1faa0a28786c8304ed08b6164085e7b1bffa7d74fff9e18f2c1f5a0e716d277ba0ec7a7cb015630b47b1defe3d3b432ab4d360b4a990296db6daa0162699cebfdcdc7f40c92a7d846e48501449d930c037c2e273f66d624779be87d1600262290c30db5fe268d68f5b2e46d9e5519b6204481ba980a223d2ff7237f98d110637d908d089aa0b8201510642ffb2d7cd87ae7ec75e26e6c7df072a6dfde8d6f9347843e99fb19522503711013db436872ffdbd98a8f284b3cc8d7693b4839361d436a3d3301bcc47e733150c3fd1b7da0c2f4233a321ae764d3226095e6ff6c5a176e85300fb058baabcc84b0aec17dafed690c0847fa2d5e93ceff312a9cb49c82a148737158a5da0c34bca7e6c7977ab8bb6d5613c56e0d0d5d6c1c7cfb310ef8def9c2dd407e1eab6d43f8103eed8bbc22980e3fe2ac4dc79382e4f77c06d364987677b479ffb24fb00c95a00064d2abcd0b00c442810579657306d964e78c3e1e22635605ec4a5c1f3638cdf47e04e97f815a23016fc963fbb8b5210abdf0990af81c7a61273050a3d9a9beea92856cdb5acb004a2c3ab22b99715ca598bd2dae5cb99fe99408431bcfc350b7bca25abdfe0ae79fce814a8176ff00ce8834c91b1c62e050bdfe065ef8b26c1a41a9a283f8c9b7e25b96db1d2798c27e597822eec0bab5ad5b68a0aabb263ca3ef845f0410cac546824992ae290fb2ba5505e50db7814023520829c0f5d1fddec807e4eb0962638979a7bd6569e9a0fcbda66b6f333a9c5a8d0c5b07eadd301dc8fde559a499e046e8ea3176146fdf61df3294c02fa6588e6bec884df1b53694308bec8f1d810889cf7a59a7a75f7c289516cd4c7093878d73d0d504c6d70f37e0028ce5f57262f41dde0c51bf1e4f9f6c3812b1264c5b7a38234480ea9b89d53c683ed01542b67df8029dfba43c125bd58f5234d0675da723721e372cde0eefb19c395bd69b20750e0ba413d8e6c476d94c666773fc317407c3342fee09551984a9794ad6b56c028eecf629dd91837d7ebe39308b92696f0371a63f4c22c53e56d45f0e63a228212a4cdb47899ab4ac3737099d9e0ce3186c85baa2c204531b2c54e0bf9846a98c5f1be093fc3e0b34fc0c72211f0a1f2707ecd80e2867041e9d7f9a8ea9655584be602fbc9dd1dc9c78e06c6b8ab44a380093b7b626c2305c11cc9ba0c876a185ecfebb877f1c52ea31b22d34028edaae63dcae164e8e2713a24dd13ba28358f59a812e412143d34046ffe185a7d2b2e112c94b4f4ad05d3c2b285baabf662f07c7f8b7c665e21890a8a000b547cabbb52f47b3aa90453d772d815d5e3494aadfad9cd7913e0543f67cefbaffffffffffffffffdb4ca5da427ac3cbe7c196fda03e6bbeece50f13120a1eb3716751169432de90d0d29c7b1502eb9a94fc8cdc95a9b59c40b0a9c75efc8482bcc8038cbd2a55a7aa0ad951704f91f408a785abb199b70631a2c3d3db50f670fd217897678b657ad94568584cdd9f8f6aead6ed7bbee20900a6ebe55e96bf6d5a485f12b1ed5e0bebe3d974cc21d7e57c3550fbcc819342e1c5d97d8661f6da53210999f48e16beb0597cfb1af2159e379766185455214118ffee8ae4b90ebd04763fdde502f688191f51619c3e2b32861f87199bcc433f5fbe2a323c6ebfe88a5118f49af45045a87c9b77481c942f1e3750538b3089ef5b090c6dd28efbcdcdf2bc211db082a09e694e3d24f908d5b0cf2120ffeaccbceafa9b45467b8d75f1341d112fc483eba9876ee4507a48eec9b41ece0e96d0da350ce5f751a5551f6afc5a34ff07c7edc91ebf9879fa35e05857e8789ac9cf697f90ce4f2bbcb5f96704d8fab374cee6f53af7dd5885c94146b38e7a2554818e576ac9e5d60b17cf1bfc5446f0ec642256226b2a3c32f6cdd1fd71813dfdc8a695859786ac032a748488186868523c3604e618f4aada42b6729acb95f8106fa9bbee64b0f7266436bd41b68d1f412e2f6a7f030d2763549c666acbc39c4631b326eafceed97dab97bc3a69c01a2e83fa6622ee8743080a60b000f29ee099afd8c5c5ce86a8fa49c932ad11feb768dfa03ee9302010205f3670514ab1bc9edec3c2e13d8e83fdda8d7c8382033388361b07bb57d7716ed63834586425d8277b4a1c404409e78f2686359370495d25d202b353ffa639e19cdf592bcf62b51469b5929f85f9f43905f4aab5256a11caef879dbbfe0279381e33bacc044e09e776383ba897c922ad04e45261f4e5dee8c1a5abcca7d9e9efa589a4d300eaca26c0b4b295d48a2fac93a473b06ed708d53df8321c0a34ca021f596ed9c8b9f444a04b40d8ea3132205d8a48ef2347b18d97b6ce21932f314c024b2ed5556562a3e7d1afe5c67d7cb0fb521d96005fc910b06228cc0d363641ae7165bf3f9f74e93ae25d81ba99e62cf758603141c0e878bd98806098c56554d8aaf89f2d7314da1edd64acaf2e30b3b227f7e21443dacdaf2f61ac049c1dcf77c796d931ed9345305660894c4cff19296d24c6ec03e71b2220993585e7fb048746a48477e71ceb20a0d0a51020c4e9633c7dc2790d86af1d3e6661c1a6b8df05c1dea4516bb08c586479d2d80f323dbc0add413ae99e84306502efc666d8b97ede1a5e47ec36843de110a726dbd8f1b79252c3929963c45ca00d0a7d4d24f87bfc24037fbe03c48b365f37f504e73fd0064ea8d0a512790ee192f366655787a2ece2b2b8091ebca467d1ca76d91f1db024a251417fa1949ab4a3ac5647ba7a79a1e7a32e860bcd3b24e6b0e5759e897ee4764bd833494f2bf054f74d4f91f79ca1134e96f2b80fdcf455c21726e5a782071578a33a9b782ebb44cf7873cb77e5664de2df021c577846ec9c16c4b74c53712db8c7b8309b509007617cea2d98c80132e99573abe264eb524746849e64e328848db597f83d4b571121f0c1dd63c826ff5f000891838aaabbe9e4c4d9401520c99afb28dc1f639099d136fde759b9065b6ae139768eff2e9a95609a642f02f94994a8a4110986f1350f4d5fbd75d110be212548aecc7aef409303718729ec25b24a6e9089f34c29f15d3a6e3d06738bd253f6da8c88b24a892abd88135c6cf44ed69897f1e062503379a360c9c5a755f8a23b0ba662494d4a783686f34e1fec51557a365c48c56e40f0e5b078bee2ecbd3e05cd78ea9a6cc83f298070ef81e490379647804fc5aa16e9f14872e7f2b1dd6add05de824adda00a4cf523c6c903fc4d41a813cdbaa013f9d24c0665bdb8316c573ca26b7ead12c1fb631724f1283374a97eeb697be54ceb0cacd8770fdcc8b101ca71161ab004c0502175908ac00913a2dad540b3eb57bf8601945008abfafa878f6e0d75c41ae61e351611c6ddcd486ec95499af9963207d5b9eec75a77dc07cc59032aa57964530124920b24ed3382facf7cb0be1500139bc508cebcbca03b51f1ce158c5fbca6c6cacf91050cd0d3d945ebceeb43a50909541913a865395c3cf1b2ec172f859557c518058f9198a3b9fd002025757c7c65b7e6f4a43f0d0147efae87f24a636f5cdef49c431958ee3174787cb2d602fa5810713dc63964940b40425b697758cc21166230c94021eea7e9a7837ed89f75207709c68b0a62ad44c754ef1a151f86f71d6854934030aa0a18bce5cd3a55f118d5ab3c50477ca66618dc85dd1a86312f2535a7f24546beb9d429fd15f7f7c331c985bf6d8a2e916bf314e879f876e843e4de7c23563c2b3b82bbe9d7d2596d14bcedf13f9c662bb19acb98401e0a9a41bc08214f93533577402dc89bb7987060d751247b1aed340c02f8175c6cb34c612fd66adb465c62c913e7f72f19732c754c666006cbbae47b4235dea894a9aeaf5c5448b841afc3ad4d8a21ff68146b912f101000000000000004bf143ea5b394d856b95fd8e5e619e7147117182e0a432d363d497858b6870a0fad155571db7b9dd74072a3a2fe131956675e91018ec8cd60d7804363e2a90e0e3c58166c07d46558f89ba06216130953abc329236a8e72fb871077309d8198b263a2513cedf827cdb98563c0d12e6b1527373ba9aac84da450b5c8e3171c91f8d7c7269cc7257e3625ef226e491298cebef9b9859bb8ba30b9ff4a2bbfe5523a96cb03f20fae86fc008476d70e0a683279fd1eded567d93cf0364c702fefba2c78c8e7ccaa87c9dffd251c451ad1601e26dcd8651365a630511a7afed569a9eb4438dd8b568de668d43cdb429779c4dd249fcc0bd10028490ec094497c1cb0683f9b63bb1580232a371634e4aebcbb4782c424423188ad970375f00437e7d80c90c0c3bef4d512ce4b3a1a4c220c72d8eae0ba6e8b3f94a18fa5bbffdfefd5f56d96e4366953e0c2f07928f71defb93e33b1d482c1cfbb5a0d3798b1b9f5c18155f626887039831f4e90796572020a057539a54b84fe795583f2fa07cc2160c67eae8ff7dac13a8e7da0e7b79af0c42567a0669bcd3e2f44b13051dfa3006787e8d409308cb9110ed3fa3fe435c8a247f7d111051ad549c35c57f11d4d26d6fe0f94734ffdfaad712f4b24896d440695d7c0c0ab0e641d794d8753adb10de648981f43b0b8f8341263b756a63a581593c326924a90037be79860a2f6f432455d2d4d7f74ee3b60cf633213c9c0bc4a7903e733e42bfcd147a5520378f0a1a4d2a3ef7770b3615f087259c262dd5bdfdf2bba43f024413b72c506f50ec7644251817f9a591dd783ed69c1557f9d2d7a07f4d5aac6b7659619d4522d1635b4a46852625798279a1674a9d61d8ecb910a32a86e2430dbad7fb068b6f92ffc7c11a71adabb80c712d5b9d837a5e82ad577d8251fa01ec09822021eb104ca60a90f007d8e0c7e60229727d051a267e2bc64135b11f773cf0fa4982f5b3acd65ce7b05ea590dff0d32a30348b018d23bb83c0e254b4e2e084b9f0e36f82e4ba5ff4cde5cfe6d87d07c9a43686fe59cb049dca53241a4ef696338fe11ade3069b9c92bc5ed71891e9170f7c6c0f37b0f16c64bf5a3c1c44dcc76866bd2de58396696e1341ebb3de6bf5ccde7cb1971e4a50bfdbaf7c549ad659a1b022fd58a7cc77372417f935aa7e1aaa0fbf90498c888c4161b66c1c09b1abfb32a22e470e44492e26cdfe1ac19c4d85a9a35890c0cfeab2ad301946cbc2e10c372c86b49910d52129eaa9ea4566a39dab037c1d1915fe7bbafa73031b3c6f54fc97c53936c06bc4556f842785c7f0dae56f09461962a16b228b37b822aa19d732b25210ce3e2b7c945f79036c5db44dba19819a67bd421ee33898b0acdf7fc3e04f9f9492fd8688370632c7d503ac7ebaaca54328ef32ca0caf1ebfc93c6a24b474a85dede75e82399519fa386854a0167a7cf7cefd57e6f6283db276152cf277aa21c8ad28f116debafb206bb5c330506eac2ae2aa7b8493da5cc403c11144d8cda3e910624b6aa2328b41fa5d5d27a1ad261232550130bf41314d12a158232ef7d74a43bee39b6ee9661a36331bed4f582d13e68fbf91fb8455de887f9fd02d5d52146b5c34419a673eccccd77a3b6d1f9208d5db89afe2a670cc088da34a802f1f929e69d1634c2cecbd566e31a81388ba138d339acb7abdc1ad99388c5a554e44fbea087544a5a8a28a7fbf199651cc983d53632c7b3eddb1ac200080cc54d93ed86a9ac28af1da6c045") setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000002080)=@filter={'filter\x00', 0xe, 0x4, 0x3b8, 0xffffffff, 0x128, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x320, 0x320, 0x320, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0xe0, 0x128, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x3, 0x2}}, @common=@socket0={0x20, 'socket\x00'}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@remote={0xac, 0x14, 0x14, 0xbb}, 'erspan0\x00', 0x1f}}}, {{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@inet=@socket1={0x28, 'socket\x00', 0x1, 0x1}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@ip={@empty, @multicast1=0xe0000001, 0xffffffff, 0xffffffff, 'ip6tnl0\x00', 'sit0\x00', {0xff}, {0xff}, 0x1f, 0x2, 0x8}, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x9, 0x7f}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xe}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0xfffffffffffffecf) syz_emit_ethernet(0x7e, &(0x7f0000000100)=ANY=[@ANYBLOB="7fffffffffffffffffffffff86dd6006f526000811000000000000000000ff02000000000000000000000000000100004e22000890780000000000000000fce8f7b6c4e0d2484df9fa5f72eb42d587865bd10675bca9c96f516c4dbdf84cc5839a3c2fffb80eb5e92c6a3e22e8dd0200b94376532196fe41cdbe5f978c81e35c993c58bd964254af"], &(0x7f00000000c0)) 00:15:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r3, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:20 executing program 6: clock_gettime(0x0, &(0x7f0000000040)={0x0}) r1 = semget(0x1, 0x0, 0x400) semctl$IPC_RMID(r1, 0x0, 0x0) ppoll(&(0x7f0000000100)=[{}, {}], 0x2, &(0x7f0000000080)={r0}, &(0x7f00000000c0), 0x8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$inet6(r2, &(0x7f0000000000), &(0x7f0000000140)=0x1c) shutdown(0xffffffffffffffff, 0x2) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/106, 0x6a) 00:15:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") socket$inet(0x2, 0x3, 0x9) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1c) readlinkat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000600)={r3, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r2, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r1, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000040)) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:21 executing program 7: unshare(0x24020400) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x200000, 0x0) fsync(r0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x22141, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f00000000c0)="d897e8ac064b26e729b02ea623556c86480d7fcfaad4d051c7dfdaea3f421e0c78a28afe49621f2e37560e3ad207626b52c33c01085d6933a497e2cf443597025c9f1771aa0826fe6a2cb44ae61d86c8340205b4a18c00e67ab3a935e883e5c6ffe413c75d3b242f4abce933502badac72fdb279e4f9969c776c8ea1fbe7c5066f0184091c9d40a3763ce5f170bd18b20f2d8f0ef35635f6ce43d2bd9bd96b35fc7192acb5e2ceb611497d10116e5ba3", 0xb0) 00:15:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xcf, 0x2900) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000100)={0x6, 0xfb, 0x2, 0x0, 0x7, 0x1, 0x1a6, 0x6, 0xff, 0x4}) socket$inet(0x2, 0x3, 0x9) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5db8f9d6, 0x1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000040)={0x4d3db599}) 00:15:21 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") semget(0x1, 0x7, 0x200) r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) semget(0x3, 0x3, 0x200) getuid() r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x10000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000280)={0x800, 0x9, 0x401}) getgroups(0x1, &(0x7f0000000040)=[0x0]) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) fstat(r0, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'eql\x00'}) 00:15:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000000c0)=""/191) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200) r2 = socket$inet(0x2, 0x80000000000000b, 0x6) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:21 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/32, &(0x7f0000000140)=0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) getuid() r4 = openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) ppoll(&(0x7f0000000100)=[{r2}, {r1}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) r5 = openat(r4, &(0x7f0000000200)='./file0\x00', 0x6000, 0x104) ioctl$TIOCEXCL(r5, 0x540c) ioctl$KDGKBMODE(r5, 0x4b44, &(0x7f0000000240)) shutdown(r2, 0xfffffffffffffffd) 00:15:21 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x301081, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x1ff, 0x40, 0x0, 0x3ea4168d, 0x0, 0x7f, 0xfffffffffffffffe, 0x20, 0x0, 0x190, 0x0, 0x7}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_pts(r1, 0x10000) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000100)) 00:15:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x8000000004) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) capset(&(0x7f0000000040)={0x19980330, r1}, &(0x7f0000000080)={0x3f, 0x5, 0x5, 0x20, 0x18000000000, 0x75}) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd0000000c000100080a0c00410400000000fcff", 0x58}], 0x1) 00:15:21 executing program 1: r0 = socket$inet6(0xa, 0x80000000008000e, 0xfffffffc) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="7359637572697479000000000000000000000000b0f7351c00000000000000005f000000c280390c7bdcc5c63a8a942e73bc0399f999c72c50be16c6ef66390326bd3fd06d4fec384293b0e2f3b77fe1ff79d76726c858547071fa67090d350d6c2496ac1f0c2019cadf3f4dd3b23a549c747a39bb4bc9b09470a758eeb70adb7481eaa7c857f7952001db33bd39de05aefb70732f2a6811dd25f07c7c14d3af00025e0ab1cd162aad84161f62ec9b84c6947d2743d8ea5ea874a78cb82304ad6e01d2329ee7de96ee3dcf78f689174537015316bce718ea0975d16a482a38e69815b112d77fec81d65d9ba305b82f6256c688b18cdae30e36556bfacd7402bfc9827988db0d2d2b075a489f16259e03acb9692a8f050b5a549e9236692309d8f5a53a03eda815f0efe81ee0958cebed69b25f3aa710c4128925e2aee4554a9e3ec745c049fa2f20b9e5188d0587bd31ba81d1ff617158240d8877ba5b80edd5995b25b365b62434f495dd68a95a5b8438"], &(0x7f0000000040)=0x83) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x195) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0xe6c, 0x8) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e20, 0x7fffffff, @dev={0xfe, 0x80, [], 0xd}, 0x9}, {0xa, 0x4e20, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0xeac7}, 0x65, [0x5, 0x0, 0x8, 0x10000, 0x0, 0x3982, 0x1, 0x200]}, 0x5c) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000001c0)={0x5, 0x70, 0x4, 0x20, 0x8, 0x7fff, 0x0, 0x7, 0x1022, 0x0, 0xd192, 0xffff, 0x5, 0x5, 0x4, 0xe5, 0xfffffffffffffffd, 0x5, 0x8f2, 0x0, 0xfffffffffffffffa, 0x7fffffff, 0xfffffffffffffffa, 0x8, 0x1f, 0x9, 0xffffffffffffffd6, 0x5, 0x7ff, 0x9, 0xffff, 0x2, 0x7, 0x7, 0x8000, 0x3ff, 0x6, 0x400, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x7b1}, 0x1, 0xb04, 0x80000000, 0x7, 0x2, 0x964, 0x10001}) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'veth0_to_team\x00', {0x2, 0x4e23, @multicast2=0xe0000002}}) r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000140)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) [ 448.018734] IPVS: length: 32 != 8 00:15:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477673070") r1 = socket$inet(0x2, 0x3, 0x9) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f00000000c0)={0x0, 0xcc, "e357d9023b667cf2ae74f0d7744b33ed47bcdb294d212f91ef4411b4865e6b6a2abf04f7e2afd550866562b8ad9bb852313a463ebf564f6c9e12459dcea135d1f701d7012862f4588d4db7dc2337e099c39ff68b13ac567a173322bb7882b6b71201334d0351dce837b23250e231cdd8d9d25fc1b81990b552eb81c316676b693529d909db569c1cafa8b115acd906d269729055e8f71ef2215e3593554ceca877a92c95475d6cf0729b29ce4856695edaef8ddaac0c289100173acf1640cbf4bc9415f2d1539fb49c5b5cf7"}) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='dctcp-reno\x00', 0xb) 00:15:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0x7f5, 0x9, 0x1a}) 00:15:22 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200000, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x10, 0x6, 0x200, 0x70bd28, 0x25dfdbfb, {0x7, 0x0, 0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000040) socket$pppoe(0x18, 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f000000bff7)='/dev/dsp\x00', 0x4400, 0x0) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x4, 0x40004) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x20000) 00:15:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x6a640149f8f55c1b) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) sysfs$2(0x2, 0x1000000000000000, &(0x7f00000000c0)=""/193) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:22 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x7, 0x0, 0xffffffffffffb6b6, 0x20, 0x0}, &(0x7f0000000200)=0x10) r3 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0xa0b, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x2) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)={r2, 0x37, "cae70c479b68f73867afea33605d049b81811895ffb7e23bb58f3c412cc7e3f2dcacffb6368c21d225cf43f9fcdfbf3a30eff4e46c8b20"}, &(0x7f0000000280)=0x3f) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x80000001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={r2, 0x8, 0xffffffff}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x4e24}}, 0x40, 0xdb}, 0x90) [ 448.912550] IPVS: length: 32 != 8 00:15:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0xa01) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000080)={0x81, 0x100000000, 0x5790, 0x4}) clock_gettime(0x0, &(0x7f0000000040)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@mpls_getroute={0x2c, 0x1a, 0x500, 0x70bd28, 0x25dfdbfc, {0x1c, 0x0, 0xf4abe828db3dd27a, 0x7, 0xfd, 0x3, 0xfd, 0x7, 0x2600}, [@RTA_TTL_PROPAGATE={0x8, 0x1a, 0x9}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x804}, 0x20000000) shutdown(r0, 0x0) 00:15:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1c) readlinkat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000600)={r3, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r2, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(0xffffffffffffffff, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:23 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f0000000080)=0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x20, 0x429, 0x8a, 0x0, 0x2, 0x3, 0x8001, 0x34, 0x40, 0x6b, 0x4, 0xfff, 0x38, 0x1, 0x3, 0x2, 0x3e0000000000000}, [{0x6474e551, 0x7, 0x8, 0xfffffffffffffff7, 0x18000000000, 0x400, 0x400, 0xfffffffffffffff9}, {0x6, 0xffffffffffffff4d, 0x1ff, 0x0, 0x7fffffff, 0x76a8c285, 0x1, 0x6}], "66c956ba483fc8f42a1876b236cea09894b4340a0d0a680e21adac7fb28d9394c7e6182c277ca17d266ed2d2de9b06fab6e483033460a83a9e22f6cdcc9661fcba81fec192ea21a9a45236f0d4eded1de939f05cc65f913e2cbd6c73ef79832e052e88eee49e40c94e5d443f198e594f6fb1ec26018ca5daaf5cddac95a2dc7726b63e81824b4b168760a30a0247bf5da35bd4f9ad8d4e6bfe44522341acfb4210c66e1aa8a4579b05314758d61af3472f4864587d696925227d62684e150d2097e63d6b107f32b1da6420f0c43d7f13fdca7ff793f1a0e94ec944a4c19b0437da0fb4285d21dd151a51ec4b52d33d36d40fc3", [[], [], [], [], [], [], [], [], [], []]}, 0xba3) 00:15:23 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x200000, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000080)={0x0, 0x9, 0x3, 0xbdad, 0x1ff}) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) 00:15:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") ioctl(r0, 0xfffffffffffffffc, &(0x7f00000001c0)) socket$inet(0x2, 0x3, 0x10000) pselect6(0x40, &(0x7f0000000000)={0xffffffffffffffdb, 0x6, 0xffffffffffff29d8, 0x6, 0x401, 0x0, 0x0, 0x2a}, &(0x7f0000000040)={0x4, 0x3ff, 0x0, 0x9, 0x200, 0x7, 0x2, 0x8001}, &(0x7f00000000c0)={0xffffffffffffffff, 0x4, 0xff, 0x9, 0x10001, 0x8001, 0x7, 0x47c81025}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={0x1}, 0x8}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x20402) connect(r0, &(0x7f0000000300)=@xdp={0x2c, 0x0, r1, 0x2e}, 0x80) 00:15:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x6f) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x440, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000100)) 00:15:23 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:23 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f0000000080), &(0x7f0000000000), 0x4) shutdown(r0, 0x2) 00:15:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xb, 0x9) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6080, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000040)=0x1, &(0x7f00000000c0)=0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:15:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1c) readlinkat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000600)={r3, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r2, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r1, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:23 executing program 6: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x9, @loopback={0x0, 0x1}, 0x100000000}, @in6={0xa, 0x4e20, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x1}, @in6={0xa, 0x4e21, 0x401, @empty, 0x4b}], 0x54) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r2, 0x80000002}, {r1}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x103) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000140)=0x78) shutdown(r1, 0x2) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, 0x28, 0x228, 0x70bd29, 0x25dfdbfc, {0x11}, [@nested={0x14, 0x42, [@typed={0x8, 0x88, @u32=0x8}, @typed={0x8, 0x86, @pid=r4}]}, @typed={0x14, 0x6a, @ipv6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x4048885) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) 00:15:23 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x200, 0x40840) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x1f, @remote={0xfe, 0x80, [], 0xbb}, 0x6}, @in={0x2, 0x4e22, @multicast1=0xe0000001}, @in={0x2, 0x4e23, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e20, 0x9, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x2}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x84) ioctl$TCXONC(r0, 0x540a, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000000c0)={0x2, 0x400, 0xffffffffffffffff, 0x8000, 0x8, 0x200}) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) 00:15:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000140), &(0x7f00000001c0)=0xb) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r4}, &(0x7f00000000c0), 0x8) shutdown(r2, 0x0) 00:15:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x240) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000100)=0x3512eda0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000000)={{0x0, @empty, 0x4e20, 0x0, 'wlc\x00', 0x20, 0x7fff, 0x5a}, {@loopback=0x7f000001, 0x4e21, 0x1, 0xa150, 0x6, 0x3f}}, 0x44) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:23 executing program 7: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:23 executing program 4: r0 = socket$inet6(0xa, 0x4000007, 0xc3) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000940)=[{{&(0x7f0000000340), 0x80, &(0x7f0000000800)=[{&(0x7f0000000fc0)=""/4096, 0x1233}, {&(0x7f0000000080)=""/157, 0x9d}, {&(0x7f0000000680)=""/203, 0xcb}], 0x3, &(0x7f0000000880)=""/179, 0xb3}}], 0x1, 0x0, &(0x7f0000000000)={0x77359400}) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000f40)=@ethernet={0x0, @random}, 0x80, &(0x7f0000002380), 0x0, &(0x7f0000002400)=""/191, 0xbf}}, {{&(0x7f0000003440)=@l2, 0x80, &(0x7f0000003680), 0x0, &(0x7f00000036c0)=""/64, 0x40}}], 0xf, 0x0, &(0x7f0000003700)={0x77359400}) 00:15:23 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:23 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0xac87, 0x42000) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffff89a, 0x24000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000140)=0x4, 0x8) shutdown(r0, 0x5) 00:15:23 executing program 3: socket$inet6(0xa, 0x1, 0x0) r0 = socket$inet(0x2, 0x3, 0x9) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1c) readlinkat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000600)={r3, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r2, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r1, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x7fffffff, 0x9da286612fa60469) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x495, 0x1, 0x10000}, &(0x7f0000000140)=0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f00000004c0)=""/246) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{}]}, 0x9) ioctl$EVIOCGREP(r3, 0x40047451, &(0x7f0000000000)=""/174) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e24, 0xbdef, @loopback={0x0, 0x1}, 0xffffffff}}}, &(0x7f0000000240)=0x84) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r4, 0xc0105303, &(0x7f0000000080)={0x193, 0x30edb00d}) 00:15:23 executing program 7: r0 = socket$inet(0x2, 0x4400000000000001, 0x0) mlockall(0x3) setsockopt$inet_tcp_int(r0, 0x6, 0x81000000000002, &(0x7f0000000200)=0x78, 0x4) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)=0xc3) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffdee, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) sendmmsg$unix(r0, &(0x7f00000050c0)=[{&(0x7f0000002d00)=@abs, 0x6e, &(0x7f0000004f40)=[{&(0x7f0000003f40)="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", 0x439}], 0x1, &(0x7f0000005040)}], 0x1, 0x0) 00:15:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x440, 0x84) setsockopt$inet6_int(r0, 0x29, 0xcb, &(0x7f00000000c0)=0xd0, 0x4) r1 = socket$inet6(0xa, 0xe, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r2}) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) 00:15:23 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, 0xffffffffffffffff, &(0x7f00000ddff8), 0x102002f01) 00:15:23 executing program 3: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r0 = socket$inet(0x2, 0x3, 0x9) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1c) readlinkat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000600)={r3, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r2, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r1, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000080)=0x8, 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) readahead(r0, 0x80000001, 0x7) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x1) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 00:15:23 executing program 1: r0 = socket$inet6(0xa, 0x800000000005, 0x4) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200140) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0xb5, 0x1, 0x9a, 0x5, r1, 0x100000001}, 0x2c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="070000000000000000006d12b2597620"], &(0x7f00000000c0)=0xf) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2, 0x7}, &(0x7f0000000140)=0x8) getpeername$unix(r1, &(0x7f00000001c0), &(0x7f0000000080)=0x6e) 00:15:24 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) sendfile(0xffffffffffffffff, r0, &(0x7f00000ddff8), 0x102002f01) 00:15:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) mq_timedsend(r2, &(0x7f0000000140)="624653fab8ad152174", 0x9, 0x5, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:24 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:24 executing program 7: unshare(0x24020400) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x7) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x7b5dff8d67f4e9c8, @multicast2=0xe0000002, 0x4e21, 0x1, 'sed\x00', 0x18, 0x100, 0x3d}, {@loopback=0x7f000001, 0x4e20, 0x4, 0x6, 0x2, 0x2}}, 0x44) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'os2.', 'sed\x00'}) 00:15:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0)=0x4000000100, 0x4) write(r0, &(0x7f0000000140)="2200000018000700f40700000900071502040008dd200828060009040005009f004b", 0x22) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f0000000040)=0x4) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0x2, 0x1, 0x3, 0x3ff}, 0x10) fchown(r0, 0x0, r1) umount2(&(0x7f0000000100)='./file0\x00', 0x7) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000009, r2) 00:15:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x40, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='memory.max\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0x1) 00:15:24 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) io_setup(0x6, &(0x7f0000000000)=0x0) r4 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400) io_cancel(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x9, r0, &(0x7f00000001c0)="baab5bbc7fda929b909beb93e9fd46ead53d9a666e241604acfbd6a5d77eb8c43544fcd09a06780ca51b9c0bbf053eca6e6543bdbe2cffc992e52dc26901cdbec2ef446026ddb7064f7bc622783c44d6a7beba0d7565c8f18c033bdb0f124b43cbc9f72f4a208bc74cd46498e0cfdc58c13ac6b6e08496181abce11f50b5d2e06993aa018b964ab086f589a00541d0ddc61a29c03e823f271e9a486bc0fa6dc2c18ea3ee88d6ec42a44248eac66ac3ec5e57794395c49c6357c5dc1bb06d521d2a9ac0daf6868756bb938fe379fe5011d66d7a63eb66ce9453f97d82f4", 0xdd, 0x8, 0x0, 0x1, r4}, &(0x7f0000000300)) 00:15:24 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TIOCGPTPEER(r0, 0x5441, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup(r1) epoll_wait(r2, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x7f) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000001c0)) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000000c0)=""/112, &(0x7f0000000140)=0x70) 00:15:24 executing program 4: r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x41, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$TUNSETIFF(r0, 0x894c, &(0x7f0000000180)={"623d015b814000"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x200001) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@remote, @broadcast, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000000c0)={@local={0xac, 0x14, 0x14, 0xaa}, @broadcast=0xffffffff, r3}, 0xc) 00:15:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0xfff, &(0x7f0000000040)=0x2) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 450.832859] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 450.844053] syz-executor7 cpuset=syz7 mems_allowed=0 [ 450.849373] CPU: 1 PID: 23464 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 450.856318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.865690] Call Trace: [ 450.868329] dump_stack+0x185/0x1d0 [ 450.872004] dump_header+0x2cc/0x16f0 [ 450.875862] ? __msan_poison_alloca+0x15c/0x1d0 00:15:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 450.880581] ? oom_kill_process+0x2e0/0x2160 [ 450.885046] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 450.890553] ? ___ratelimit+0x67f/0x760 [ 450.894586] oom_kill_process+0x341/0x2160 [ 450.898858] ? mem_cgroup_scan_tasks+0x289/0x610 [ 450.903662] out_of_memory+0x1700/0x1da0 [ 450.907758] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 450.913150] ? _cond_resched+0x8b/0xd0 [ 450.917071] memory_max_write+0x4d7/0x770 [ 450.921271] ? memory_max_show+0x1b0/0x1b0 [ 450.925564] cgroup_file_write+0x441/0x8d0 [ 450.929849] ? cgroup_seqfile_stop+0x150/0x150 [ 450.934466] kernfs_fop_write+0x612/0x890 [ 450.938678] ? kernfs_fop_read+0xa20/0xa20 [ 450.942968] __vfs_write+0x1aa/0x9f0 [ 450.946738] ? kvfree+0xe4/0x100 [ 450.950160] ? kmsan_set_origin_inline+0x6b/0x120 [ 450.955098] __kernel_write+0x201/0x5c0 [ 450.959149] write_pipe_buf+0x1d5/0x270 [ 450.963184] ? generic_pipe_buf_get+0xf0/0xf0 [ 450.967729] __splice_from_pipe+0x4a5/0xf50 [ 450.972112] ? default_file_splice_write+0x380/0x380 [ 450.977275] ? __msan_metadata_ptr_for_load_4+0x10/0x20 00:15:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe00", 0x9) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000080)=0x3) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x1e, "ab70b53e1cce2a1e43490f4cf99ce176f540135439ca06478ef480816d9a"}, &(0x7f0000000100)=0x26) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r2, 0x100000000}, 0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e24, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x9}}}, 0x84) [ 450.982683] default_file_splice_write+0x1d9/0x380 [ 450.987656] ? security_file_permission+0x3f0/0x480 [ 450.992735] direct_splice_actor+0x19e/0x200 [ 450.997191] splice_direct_to_actor+0x767/0x1040 [ 451.002008] ? do_splice_direct+0x540/0x540 [ 451.006407] do_splice_direct+0x335/0x540 [ 451.010635] do_sendfile+0x107b/0x1e40 [ 451.014613] __x64_sys_sendfile64+0x218/0x390 [ 451.019157] ? __ia32_sys_sendfile+0x160/0x160 [ 451.023770] do_syscall_64+0x15b/0x230 [ 451.027702] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 451.032911] RIP: 0033:0x455ab9 [ 451.036120] RSP: 002b:00007f77efcefc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 451.043856] RAX: ffffffffffffffda RBX: 00007f77efcf06d4 RCX: 0000000000455ab9 [ 451.051150] RDX: 0000000020000040 RSI: 0000000000000015 RDI: 0000000000000015 [ 451.058467] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 451.065773] R10: 0000000000000001 R11: 0000000000000246 R12: 00000000ffffffff [ 451.073063] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000000 00:15:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000000c0)={0x2}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x2, 0x5, 0x10000, 0x4, 0x9, 0x8, 0x1, 0x5592, 0x8, 0x0, 0x3, 0x8}) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x3f, 0x8080) membarrier(0x0, 0x0) [ 451.080590] Task in /syz7 killed as a result of limit of /syz7 [ 451.086698] memory: usage 3652kB, limit 0kB, failcnt 0 [ 451.092087] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 451.098927] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 451.105160] Memory cgroup stats for /syz7: cache:64KB rss:2124KB rss_huge:2048KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2184KB inactive_file:0KB active_file:0KB unevictable:0KB [ 451.125724] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name 00:15:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008916, &(0x7f0000000000)="295ee1311f16f477671070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x106, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r2, 0x2}}, 0x18) r3 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 451.134552] [ 4524] 0 4524 17552 8447 126976 0 0 syz-executor7 [ 451.143526] [23458] 0 23458 17585 8735 131072 0 0 syz-executor7 [ 451.152492] Memory cgroup out of memory: Kill process 23458 (syz-executor7) score 8767000 or sacrifice child [ 451.162594] Killed process 23458 (syz-executor7) total-vm:70340kB, anon-rss:2172kB, file-rss:32768kB, shmem-rss:0kB [ 451.372645] oom_reaper: reaped process 23458 (syz-executor7), now anon-rss:0kB, file-rss:4kB, shmem-rss:0kB 00:15:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x8000, 0x20000) ioctl$TCSETS(r3, 0x5402, &(0x7f00000001c0)={0xffdffffffffffffd, 0x4, 0x4, 0xb7, 0x5, 0x0, 0x1000, 0x5, 0x8, 0xfffffffffffffffc, 0x8d6, 0x7}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x5) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x3, 0x7, 0x3, 0x100000000, 0x6}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000280)={r4, 0xc9, "ea18e7ad7bd73b701f29e3663b176aa4f18950bf5ea52d858d4711083de5c91e5032baa8a93c95021348a7656173024b603c14d0d09afb4988028dd1e14c5704c920669e03ff4042962a52320420dc7cd5b3dcec4ac50c5e2e9fee7da2d95949ec6c163ccb54f36860b2f2a6b47f9b190e4c7a3a07ec354abb11d3507dc0bf40a38bcfee10abd1f131e78bbf42d00621021d86701ce08086156a10568b817ab717505c61cc3fcbe5c554724cbab1730d44c8161316f9aa93f5618db2e73e58ce5f80bdfc57de41a4ff"}, &(0x7f0000000380)=0xd1) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000003c0)=0x3, 0x4) 00:15:25 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x3e4cf71c}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r2, 0x6, 0x30}, 0xc) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 00:15:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x61, "821e675fd552a0cc35a00cfe34bfad2ed6f0b14bce123f5ed0d7856ef8bf854a3a6a04373aeb63a36f3c5ab9f03ff4237e33f1eba46d76fa6d20789c8544f7da2e8aaa59f02e97219a2bd1c5e4429482c1a5c9471ff203e8dd87374d46e947c98a"}, &(0x7f0000000040)=0x69) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r2, 0x4) write$cgroup_int(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00d20d6349c7ac375b6cd955b4cd34000000007003"], 0x7) 00:15:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x22a601, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000000c0)={0x79, 0x2, 0x4, 0x8, 0x6, 0x8}) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000000)) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000140)) 00:15:25 executing program 6: ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x22}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xa4ab}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0xb}, {0xffffffffffffffff, 0x1001}, {0xffffffffffffffff, 0x88}], 0x7, &(0x7f0000000140), &(0x7f00000001c0)={0x7fff}, 0x8) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{}, {}], 0x2, &(0x7f0000000080)={r0}, &(0x7f00000000c0), 0x8) shutdown(0xffffffffffffffff, 0x2) 00:15:25 executing program 4: msgrcv(0x0, &(0x7f0000000000)={0x0, ""/79}, 0x214, 0x0, 0xa4a3ad41a879dddc) r0 = memfd_create(&(0x7f0000000100)='mime_type!selinuxuser\x00', 0x2) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/1, 0x1}, {&(0x7f0000000180)=""/100, 0x64}, {&(0x7f0000000200)=""/37, 0x25}], 0x3, &(0x7f0000000280)=""/135, 0x87, 0xfffffffffffffff8}, 0x2020) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x101000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000000c0)=0x40, 0x4) 00:15:25 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x200102, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0), 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) fchdir(r1) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) 00:15:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0xa, 0x9a8) io_setup(0x3e, &(0x7f0000000000)) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:25 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia)\x00'}, 0x58) getitimer(0x3, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x5, &(0x7f0000000000), 0x10) 00:15:25 executing program 0: set_mempolicy(0x0, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 451.786843] device bridge_slave_1 left promiscuous mode [ 451.792566] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.859483] device bridge_slave_0 left promiscuous mode [ 451.865332] bridge0: port 1(bridge_slave_0) entered disabled state 00:15:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8000, 0x101082) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:25 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 452.084992] team0 (unregistering): Port device team_slave_1 removed [ 452.148156] team0 (unregistering): Port device team_slave_0 removed 00:15:26 executing program 0: set_mempolicy(0x0, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 452.191381] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 452.257349] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 452.392902] bond0 (unregistering): Released all slaves [ 452.423250] IPVS: ftp: loaded support on port[0] = 21 00:15:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) readahead(r0, 0x4, 0xffffffffffff0001) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000001c0), 0x8) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'ip_vti0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) shutdown(r0, 0x0) 00:15:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) 00:15:26 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:26 executing program 0: set_mempolicy(0x0, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f47767") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:26 executing program 1: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='@)\x00'}, 0x10) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x14, 0x800) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000001c0)=@ll={0x11, 0xf7, r1, 0x1, 0x1f, 0x6}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)="2e0bf7d62bc757f7c2ed86dd87b78f72cd54c674e15478751c9f8e58829abbbe68b1d5", 0x23}, {&(0x7f0000000240)="009dd60a8a2a5effe58a7f69956837abbf0a0816d6469e2c901195d8886788e07ad986804328187baa76866320d955bf73b40c7da2e2ac2e6caed8dc2ed6d3275cd3576a3e32a286c8206527", 0x4c}], 0x2, &(0x7f0000000300)=[{0xa8, 0x29, 0x500000000, "452ae1797cc5cfb0e49fa55b29e95eaf178bada9eb7ad6111827f09235fe1df5de706beede295db84556a2984c45aaf41d02373ed11617ff3082c5c19e4b473ff3823347c56ef55b2699ed561aca8b7ed77153b65b623d8cec9da86ebf6d32f01245e9b390f692ff4330450b6db0f416e0e43f2e9d29c08c14ffe253bd8ff67e5bcf48324b84afc3486a00de8ec38466da"}, {0xc8, 0x29, 0x400, "b6ba2b1d99e5105a6ebfd8c3a1d38d77e93b909f80fd0480c0c900f987c938058232500cc21ee8b65dea1c804d8f41bd0e8f081832fbba88e4ebe5db5e07d22ddcebc381ecab0e4488dd4be94c91c03d913a0a56001df645d762aaf825a2d12336c35c1eb465f9b5839332f529e00e00a4efaa8857ca96a9da045bab585a459286f817a5306d47e52e6f8fd1c16b15e4d15ec91d2d6254ce13b8ed6231deafd33069ab84efeb15faedcf5fdcd4f4ba6ce651"}], 0x170, 0x4}, 0x4000) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r3 = socket$inet(0x2, 0xa, 0x9a8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000004c0)='tls\x00', 0x4) connect$inet(r3, &(0x7f0000000180)={0x2, 0xffffffffffffffff, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:15:26 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000140)=0x8) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x10000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r3, 0x4) shutdown(r0, 0x2) 00:15:26 executing program 0: set_mempolicy(0x2, &(0x7f0000000000), 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x101480, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000240)={0x6, 0x5}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fdinfo/4\x00') ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f00000000c0)=r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x4}}, 0x1, 0xfffffffffffffc01}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r2, 0x5}, 0x8) inotify_init() ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f4776710") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") munlockall() r1 = socket$inet(0x2, 0xa, 0x9a8) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) memfd_create(&(0x7f0000000000)='-@vmnet0:-/wlan0\x00', 0x2) [ 454.012755] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.019188] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.026610] device bridge_slave_0 entered promiscuous mode [ 454.067702] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.074120] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.081522] device bridge_slave_1 entered promiscuous mode [ 454.122331] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 454.162575] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 454.277109] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 454.320008] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 454.503575] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 454.510796] team0: Port device team_slave_0 added [ 454.552159] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 454.559649] team0: Port device team_slave_1 added [ 454.601791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 454.645723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 454.689648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 454.733616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 455.152145] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.158546] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.165274] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.171648] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.179178] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 455.775157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 456.690472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 456.831908] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 456.980065] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 456.986285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 456.994500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 457.133524] 8021q: adding VLAN 0 to HW filter on device team0 [ 457.973144] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 457.984166] syz-executor7 cpuset=syz7 mems_allowed=0 [ 457.989352] CPU: 0 PID: 23556 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 457.996318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.005660] Call Trace: [ 458.008256] dump_stack+0x185/0x1d0 [ 458.011880] dump_header+0x2cc/0x16f0 [ 458.015710] ? __msan_poison_alloca+0x15c/0x1d0 [ 458.020383] ? oom_kill_process+0x2e0/0x2160 [ 458.024796] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 458.030258] ? ___ratelimit+0x67f/0x760 [ 458.034234] oom_kill_process+0x341/0x2160 [ 458.038466] ? mem_cgroup_scan_tasks+0x289/0x610 [ 458.043234] out_of_memory+0x1700/0x1da0 [ 458.047312] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 458.052678] ? _cond_resched+0x8b/0xd0 [ 458.056590] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 458.061776] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 458.067151] pagefault_out_of_memory+0x57/0x110 [ 458.072358] mm_fault_error+0x460/0x7c0 [ 458.076352] __do_page_fault+0x1274/0x1a10 [ 458.080597] do_page_fault+0xb7/0x250 [ 458.084396] ? page_fault+0x8/0x30 [ 458.087931] page_fault+0x1e/0x30 [ 458.091373] RIP: 0033:0x407198 [ 458.094553] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 458.099910] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 458.107172] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 458.114446] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 458.121718] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 458.128980] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 458.136804] Task in /syz7 killed as a result of limit of /syz7 [ 458.142873] memory: usage 1196kB, limit 0kB, failcnt 20 [ 458.148307] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 458.155096] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 458.161308] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 458.181131] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 458.189908] [23556] 0 23556 17553 8392 118784 0 0 syz-executor7 [ 458.198778] Memory cgroup out of memory: Kill process 23556 (syz-executor7) score 8421000 or sacrifice child [ 458.208830] Killed process 23556 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB 00:15:32 executing program 7: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) sendfile(r0, r1, &(0x7f0000000000), 0x700) 00:15:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x0, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:32 executing program 4: set_mempolicy(0x0, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:32 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgrp(0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)={0xaa}) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000200)=""/126, 0x7e) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000604ffc)) dup2(r2, r4) getpgrp(r1) ptrace(0x11, r1) r5 = getpgrp(r1) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) ioctl$TCSETS(0xffffffffffffff9c, 0x5402, &(0x7f0000000080)={0x20, 0xa2e, 0x0, 0x0, 0x6, 0x7, 0x100000000, 0x3, 0xffffffff, 0x7, 0x381b, 0x7fffffff}) ptrace$pokeuser(0x6, r5, 0xfffffffffffffffd, 0x5) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) r3 = dup3(r0, r0, 0x80000) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@int=0x3, 0x4) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4000, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@remote, @broadcast}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f00000003c0)={0xc00000}, 0x8) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x8c, r2, 0x1, 0x70bd2a, 0x25dfdbfe, {0xa}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1000}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf6cc}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000051}, 0x24040000) r3 = socket$inet(0x2, 0x400007, 0x20) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1=0xe0000001}, 0xfffffffffffffe35) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) bind$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 00:15:32 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x8, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x100000001}, {0xa, 0x4e24, 0x2, @mcast2={0xff, 0x2, [], 0x1}}, r3, 0x2}}, 0x48) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000280)) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r4}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:32 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") io_setup(0x4, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0}) io_getevents(r1, 0x2, 0x2, &(0x7f0000000200)=[{}, {}], &(0x7f00000002c0)={r2}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clone(0x0, &(0x7f0000623000), &(0x7f00002cfffc), &(0x7f0000907000), &(0x7f0000553000)) tkill(0x0, 0x1000000000016) [ 458.484721] device bridge_slave_1 left promiscuous mode [ 458.490540] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.518937] device bridge_slave_0 left promiscuous mode [ 458.524806] bridge0: port 1(bridge_slave_0) entered disabled state 00:15:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x5c, 0x4) 00:15:32 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 458.664675] team0 (unregistering): Port device team_slave_1 removed [ 458.723182] team0 (unregistering): Port device team_slave_0 removed 00:15:32 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}, 0xfffffffffffffffd}, 0x1c) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) fdatasync(r0) recvfrom(r0, &(0x7f0000000300)=""/251, 0xfffffffffffffd54, 0x0, &(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8df0d47434cdbcd50af760189e41d163f0fc8a3fcd8091d7e462359ba12143866e68a9028c2ccc7c1fc5ae13c3f188e2e7d7b8b4d32be094067b9571df0821"}, 0x436616) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r1}, &(0x7f0000000140)=0x8) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) [ 458.769687] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 458.809752] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 458.916994] bond0 (unregistering): Released all slaves 00:15:33 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 459.083596] IPVS: ftp: loaded support on port[0] = 21 00:15:33 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 460.383704] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.390125] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.398078] device bridge_slave_0 entered promiscuous mode [ 460.437576] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.444000] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.451160] device bridge_slave_1 entered promiscuous mode [ 460.490332] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 460.530279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 460.644491] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 460.686546] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 460.869747] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 460.877137] team0: Port device team_slave_0 added [ 460.918198] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 460.925659] team0: Port device team_slave_1 added [ 460.966606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 461.010520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 461.051796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 461.098209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 461.513150] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.519579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.526322] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.532725] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.540374] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 462.367137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 463.033776] 8021q: adding VLAN 0 to HW filter on device bond0 [ 463.175474] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 463.315414] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 463.321609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 463.329623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 463.468304] 8021q: adding VLAN 0 to HW filter on device team0 [ 464.291644] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 464.302695] syz-executor7 cpuset=syz7 mems_allowed=0 [ 464.307930] CPU: 0 PID: 23901 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 464.314951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.324305] Call Trace: [ 464.326895] dump_stack+0x185/0x1d0 [ 464.330517] dump_header+0x2cc/0x16f0 [ 464.334312] ? __msan_poison_alloca+0x15c/0x1d0 [ 464.338998] ? oom_kill_process+0x2e0/0x2160 [ 464.343417] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 464.348868] ? ___ratelimit+0x67f/0x760 [ 464.352859] oom_kill_process+0x341/0x2160 [ 464.357092] ? mem_cgroup_scan_tasks+0x289/0x610 [ 464.361848] out_of_memory+0x1700/0x1da0 [ 464.365912] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 464.371274] ? _cond_resched+0x8b/0xd0 [ 464.375170] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 464.380354] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 464.385726] pagefault_out_of_memory+0x57/0x110 [ 464.390391] mm_fault_error+0x460/0x7c0 [ 464.394378] __do_page_fault+0x1274/0x1a10 [ 464.398625] do_page_fault+0xb7/0x250 [ 464.402419] ? page_fault+0x8/0x30 [ 464.405960] page_fault+0x1e/0x30 [ 464.409403] RIP: 0033:0x407198 [ 464.412579] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 464.417942] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 464.425213] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 464.432476] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 464.439751] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 464.447020] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 464.454481] Task in /syz7 killed as a result of limit of /syz7 [ 464.460676] memory: usage 1196kB, limit 0kB, failcnt 28 [ 464.466094] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 464.472909] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 464.479098] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 464.499151] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 464.507939] [23901] 0 23901 17553 8391 114688 0 0 syz-executor7 [ 464.516826] Memory cgroup out of memory: Kill process 23901 (syz-executor7) score 8419000 or sacrifice child [ 464.527051] Killed process 23901 (syz-executor7) total-vm:70212kB, anon-rss:76kB, file-rss:33488kB, shmem-rss:0kB 00:15:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:38 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) clock_gettime(0x0, &(0x7f0000000000)) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:38 executing program 7: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000340), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x1d, r1}, 0x9, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{}, 0x0, 0x0, 0x0, 0x0, "2a574dcdba126117"}, 0x10}, 0x1}, 0x0) gettid() getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000003c0)={'ah\x00'}, &(0x7f0000000400)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000440)={0x0, 0xca, "93f88a31f592604b722c1f5f38ea6b053cab7445ee71f4aaef9f3656d5f253c32752c42af0763d8d9388a4372c730e0faf6a8ffaf7c451cea8726a9efe1b870a476318939202b9dc58859ad0d1cc363464dd52a5fb75599d6000df82febb2d77a2799941f9d62f194558248e8f285bc04f07ea6561cde1447a74d52c568a40a8a9063951a4873442c5e7e041bf43c8867fd2de69029e4b2d007e906cb8a015caaa593d0cfdc85a99d68debef4020cad1783b76806758e102a72f5924f54ce70550bcde08ff72cefcd87d"}, &(0x7f0000000540)=0xd2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000580)={r2, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x80000001, 0x3, 0xffffffff, 0x10001, 0x8, 0x660, 0x5, 0x400, 0x8, 0x5, 0x10000, 0x80000001, 0x367e, 0x8, 0x9]}, &(0x7f0000000680)=0x100) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000380)={0x0, 0x6, 0xfffffffffffffffe, 0x3}) unshare(0x2000400) fcntl$setsig(r0, 0xa, 0x22) recvmsg(r0, &(0x7f0000f95fd7)={&(0x7f0000000080)=@ax25, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)=""/37, 0xffffff8b}], 0x38d, &(0x7f0000000140)}, 0x0) 00:15:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:38 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x8, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x100000001}, {0xa, 0x4e24, 0x2, @mcast2={0xff, 0x2, [], 0x1}}, r3, 0x2}}, 0x48) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000280)) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r4}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:38 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x200002) fremovexattr(r0, &(0x7f0000000040)=@known='security.evm\x00') syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x9, 0x0) 00:15:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r1, &(0x7f0000000480)="73e85f3c0297a7890179c7b1801d6d81595472090cf69fea7fda15bc19aa14a0602529ca4b89a95f25cca96bac0d3af97a6177dee795a992a6586ab0489e031590a57284194195f62481f5ae7c180e", &(0x7f0000000500)="e3093571ee92ca717138fff8c74cbe574813d2f3c18bd9609efe8350b480763ea9818d3a35be9befb39cd21d184615d796370a367e1bc2a8e5a65a1c34bdf0011151c9ba8d2a1ab7928ca9ce3b048484c6b134e2da24b9865fd8e384c4764db04c40a2e0402489a3734eb0534777438d7673cd0907a9906401957a1bc9702469f9725ecd9552d49ac77b3a6f12febdbf2a5c6bc199d8781719d288be97ed4554f3e03ba0b72d8c63249e9a8e3294f48dc7abdfdb1551e6c4e9313b3c2827dba5d30788e057ef052fb52d5e8a6d65a475ac1ae32bf3d13d9e7cb7bc6b34e74d93f6867723b8066059462c47fe38fd740f33d75032c4711c7ab5d5a6", 0x1}, 0x20) clock_gettime(0x2, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uinput\x00', 0x1, 0x0) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000680)=[0xfff, 0x8001]) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x200, 0x10400) shutdown(r0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x410000, 0x0) open_by_handle_at(r0, &(0x7f0000000240)={0xd3, 0x3ff, "b4284069c1ddbeddd80615b7a598b331724507f10457ab7f1ec9344b710dfea9fb7f2caaffbb432311684450dbc9da881bced3e1cd5fbd59195da6dc53be5f74d39908062a114a98c3a6e6abd229c0880fcc5c72c60ef0cda8c2ab34675408d9bc13f08705f139fc7e5e13fa0ba690d9fd73b1b9c5ddab7c66731a29c22a3c3874949f4e1624f1c88fded6582aaafba15a2cfd77348e51a86f8705ac13a797554bc4830f049b1d22e683e2bbf05ec83aa073868d90d7b662054fee4d93f8e10adfba42b3a1d298ada0eae1"}, 0x301401) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) seccomp(0x0, 0x1, &(0x7f0000000140)={0x5, &(0x7f0000000000)=[{0x1, 0x80000001, 0xffffffff7fffffff, 0x8}, {0x1ff, 0x100000001, 0xffffffff, 0x8001}, {0x0, 0xf54f, 0x5, 0x6}, {0x4, 0x0, 0x3ff}, {0x7ff, 0x5, 0x0, 0x3}]}) 00:15:38 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001800)='/dev/full\x00', 0x842, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001880)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001940)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000e4519dd9d1777fa7a879c9080d2b92035367541a674f98631fd5bbb0f758da93da7f81e8a27241ccd31d423eedc65bb3d3d16dcae9602a76eeaed0c96774ee0f00aeb76abff726c0196c1d20b7cfbdc40f5c616882cd040248495de82dc3a128db3318c1ee0bcf8f1bcf996500000000000000000000000000000000", @ANYRES16=r1, @ANYBLOB="00032abd7000ffdbdf250e00000028000200080005000200000014000100fe8000000000000000000000000000aa080008007f0000000800040009060000"], 0x44}, 0x1, 0x0, 0x0, 0x81}, 0x4000004) r2 = socket$alg(0x26, 0x5, 0x0) close(r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) write$cgroup_int(r0, &(0x7f0000000240)={[0x30]}, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="4fd7f0bd1cdefe9c5e6970bc302a90", 0xf) r4 = accept$alg(r2, 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000340)) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f00000001c0)={0x6, 0x2, 0x7, 0x100, 0x5}) write$binfmt_elf32(r4, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454cca00000000000001000a376288"], 0x10) read(r4, &(0x7f0000000380)=""/231, 0xe7) 00:15:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0, 0x1000000000}], 0x2, &(0x7f0000000080)={r2, r3+10000000}, &(0x7f0000000140), 0x8) shutdown(r0, 0x0) 00:15:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 464.826700] device bridge_slave_1 left promiscuous mode [ 464.832498] bridge0: port 2(bridge_slave_1) entered disabled state 00:15:38 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90), 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 464.891288] device bridge_slave_0 left promiscuous mode [ 464.897139] bridge0: port 1(bridge_slave_0) entered disabled state 00:15:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x40) getsockname(r1, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80) r2 = memfd_create(&(0x7f0000000040)=')\x00', 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000340)={0x800, 0xc94, 0xc92, 0x100, 0x800, 0x2, 0x100000000, 0x9, 0x7, 0x7}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000)=0x100000000, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', r3}) ioctl$KDSETMODE(r2, 0x4b3a, 0x3) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000003c0)={0x0, 0x2e73}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={r4, 0x1000, "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"}, &(0x7f0000001480)=0x1008) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000380)={0x10000000}) [ 465.081759] team0 (unregistering): Port device team_slave_1 removed 00:15:39 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') vmsplice(r1, &(0x7f00000012c0)=[{&(0x7f0000001280)="fa", 0x1}], 0x1, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/51, 0x17}], 0x1, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0)=""/38, 0x26, 0x2000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x8001}}, 0x1c) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x200000) 00:15:39 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90), 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 465.136479] team0 (unregistering): Port device team_slave_0 removed [ 465.192768] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 465.245232] bond0 (unregistering): Releasing backup interface bond_slave_0 00:15:39 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90), 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 465.362269] bond0 (unregistering): Released all slaves [ 465.548841] IPVS: ftp: loaded support on port[0] = 21 00:15:39 executing program 6: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_ifreq(r0, 0x89b6, &(0x7f0000000100)={'ifb0\x00', @ifru_hwaddr=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x10}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x2) ustat(0x4, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ppoll(&(0x7f0000000100), 0x2000000000000191, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000280), 0x8) shutdown(r1, 0x2) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000340)={0xd93, 0x9, 0x0, 0x41, 0x3, [{0x9, 0x4, 0x1, 0x0, 0x0, 0x4}, {0x5, 0x3, 0x8, 0x0, 0x0, 0x100}, {0x400, 0x8, 0x3, 0x0, 0x0, 0x408}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', 'S\x00'}) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000300)=0x30) [ 466.561298] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.568079] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.575530] device bridge_slave_0 entered promiscuous mode [ 466.616679] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.623100] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.630480] device bridge_slave_1 entered promiscuous mode [ 466.670751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 466.710936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 466.824247] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 466.866493] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 467.047193] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 467.054657] team0: Port device team_slave_0 added [ 467.094931] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 467.102250] team0: Port device team_slave_1 added [ 467.141583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 467.183943] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 467.225665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 467.232867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 467.241435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 467.278266] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 467.285436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 467.294135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 467.694425] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.700822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 467.707553] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.713936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.721524] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 468.703333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 469.259432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 469.402348] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 469.545614] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 469.551854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 469.559889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 469.699852] 8021q: adding VLAN 0 to HW filter on device team0 [ 470.533491] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 470.544499] syz-executor7 cpuset=syz7 mems_allowed=0 [ 470.549704] CPU: 1 PID: 24258 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 470.556659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.566013] Call Trace: [ 470.568622] dump_stack+0x185/0x1d0 [ 470.572249] dump_header+0x2cc/0x16f0 [ 470.576048] ? __msan_poison_alloca+0x15c/0x1d0 [ 470.580717] ? oom_kill_process+0x2e0/0x2160 [ 470.585128] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 470.590581] ? ___ratelimit+0x67f/0x760 [ 470.594563] oom_kill_process+0x341/0x2160 [ 470.598794] ? mem_cgroup_scan_tasks+0x289/0x610 [ 470.603551] out_of_memory+0x1700/0x1da0 [ 470.607618] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 470.612987] ? _cond_resched+0x8b/0xd0 [ 470.616897] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 470.622085] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 470.627458] pagefault_out_of_memory+0x57/0x110 [ 470.632123] mm_fault_error+0x460/0x7c0 [ 470.636114] __do_page_fault+0x1274/0x1a10 [ 470.640364] do_page_fault+0xb7/0x250 [ 470.644160] ? page_fault+0x8/0x30 [ 470.647692] page_fault+0x1e/0x30 [ 470.651134] RIP: 0033:0x407198 [ 470.654311] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 470.659675] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 470.666932] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 470.674208] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 470.681484] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 470.688745] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 470.696221] Task in /syz7 killed as a result of limit of /syz7 [ 470.702415] memory: usage 1196kB, limit 0kB, failcnt 36 [ 470.707835] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 470.714643] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 470.720833] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 470.740729] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 470.749526] [24258] 0 24258 17553 8392 114688 0 0 syz-executor7 [ 470.758611] Memory cgroup out of memory: Kill process 24258 (syz-executor7) score 8420000 or sacrifice child [ 470.768687] Killed process 24258 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB 00:15:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:44 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000180)={@broadcast, @multicast2, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000400)={@remote, 0x0}, &(0x7f0000000440)=0x14) recvmsg(r0, &(0x7f00000008c0)={&(0x7f0000000480)=@can={0x0, 0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000500)=""/224, 0xe0}, {&(0x7f0000000ec0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/61, 0x3d}, {&(0x7f0000000640)=""/167, 0xa7}, {&(0x7f0000000700)}], 0x5, &(0x7f00000007c0)=""/248, 0xf8, 0x7ff}, 0x40) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000bc0)=0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000004d40)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000004e40)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000004e80)={0x0, @dev, @dev}, &(0x7f0000004ec0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000004f00)={{{@in=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000005000)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000005040)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000005140)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000005180)={{{@in6=@ipv4={[], [], @broadcast}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000005280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000006a80)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000006b80)=0xe8) getsockname$packet(r0, &(0x7f0000006bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000006c00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000071c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x420000}, 0xc, &(0x7f0000007180)={&(0x7f0000006c40)={0x50c, r2, 0x2, 0x70bd2d, 0x25dfdbfb, {0x2}, [{{0x8, 0x1, r3}, {0x238, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r5}}, {0x8, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r6}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x1ec, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r12}}, {0x8, 0x7}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x24, 0x4, [{0x5f, 0x9, 0xff, 0xba5}, {0x861, 0x9, 0x20, 0x2}, {0x5, 0x800, 0x2, 0xc291}, {0x3, 0x4, 0xe072, 0x1}]}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x34, 0x4, [{0x5, 0x3f, 0x1, 0x1f4}, {0xed85, 0x1, 0x7ff, 0x200}, {0x8, 0x20, 0x40, 0xb0}, {0x5, 0xffffffffffffff88, 0x0, 0x9}, {0x3, 0x7, 0x6, 0x62}, {0x100, 0x0, 0x1000, 0x6}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x80000000}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x80000000}}}]}}, {{0x8, 0x1, r14}, {0xbc, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r16}}, {0x8, 0x7}}}]}}]}, 0x50c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000240), &(0x7f00000002c0), 0x8) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xaf5fde84}], 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={0x0, 0x1, 0xffffffff, 0xffffffffffff4aa5, 0x6, 0x1}, &(0x7f0000000a40)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000a80)={r17, 0xea, "4222a572c23b9d3c0f95a09634f9f7ab1d41f56776d40b8f2beb1257c5aa9c5d4aef08f666e59accfb00f1771e02cb8b37e265815fb20404c6c27e72328e88d9957a40413204c45c3d856ae66d6b0753b9d6596fe3050804c1efab3bcb0657b920fc035ec5666a262d2f9eea1ce56852d56a5c3d28273e56f625d231ec9f1e0e68fc47b60964e660dcaae775cc582ab5603337e03a87cd5abe7c38a770b3ca9a7017b57003c54f921fffba907de9ffb60e938ef40a53caa9038230136b4651c2bc9906b9fcd61d7d851cd34d2db9fe0e38b4b0099822861b83ac68246fd5cd140fb9d491c63adb94ad2f"}, &(0x7f0000000b80)=0xf2) 00:15:44 executing program 7: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000100)) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x236, &(0x7f0000000440), 0x375}, 0x10008000) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000180)=0x10) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") sendto$inet6(r0, &(0x7f0000000000)="18", 0x1, 0x8000, &(0x7f0000000040)={0xa}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa}, 0xb) 00:15:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x1f) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000016ff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000005500ef03000000000000000007000000692d4e2e"], 0x18}, 0x1}, 0x0) 00:15:44 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:44 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x8410}, {r1, 0x8000}, {r0, 0x8}, {r1, 0x4000}, {r1, 0x3204}], 0x5, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f00000001c0)={0x56}, 0x8) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:15:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x111003, 0x18) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000140)={0x8001, 0x100}) 00:15:45 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$VT_WAITACTIVE(r0, 0x5607) [ 471.059751] device bridge_slave_1 left promiscuous mode [ 471.065537] bridge0: port 2(bridge_slave_1) entered disabled state 00:15:45 executing program 1: perf_event_open(&(0x7f0000007000)={0x0, 0x70, 0x807, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffeffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x400000010001, 0x401) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 00:15:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:45 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x242100, 0x0) getegid() connect$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {0xfffffffffffffffd, 0xab, 0x6, 0x0, 0x6, 0x5b}, 0xfffffffffffffffd}, 0xa) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) recvmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x6a, &(0x7f0000000540), 0x0, &(0x7f0000000600)=""/51, 0x33, 0x2}, 0x0) [ 471.136428] device bridge_slave_0 left promiscuous mode [ 471.142289] bridge0: port 1(bridge_slave_0) entered disabled state 00:15:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x81ffb, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x8000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000006c0)={0x0, 0xa9, "5a6f4edad0cf93b4d7932099d89d4c75c8ca3f4723db34dcecf2ec9b70a1f301ebe8b1b310a71041ce32a1ce57060efcb0b65aa7420498f2cf266f225d6378b2e7b21c3d654e2b5bcd8da5363d77f5ad6bee815cde6502c58b7594330de00eedd8aa34e1db33296882a12caad947c8682d103cdf3126e2bf6fd2c647bcafbdda3c298992b88f57ad5c353474df7e1a7d8e15aeb5e87485c0ae2a91ccaee00ef476fd2ec0a4457285dd"}, &(0x7f0000000780)=0xb1) sendmmsg$inet_sctp(r1, &(0x7f0000002f00)=[{&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000100)="7cc390fc29b2b23439abd5c807920b356dd0b025611e35c82e66c8f642802d8af5d750340d2569ebae077716711aba4e3ba697ce714e74fa08e356cbaf2c6ec0f36b89e95460189ffa37d0a5ddf4d84727e4372151c1ef7399e65a0fd8e60f7b402c3fc195bb72e721d4e60d2b4335ae2fba7141684025573d1b1623e6505ffab752af3260afad2ee3d143787b33977b8da14dd1d3219fc9e9da28c86a2d501858e7d15a6fe16135a07e6512a4cab4ef4242da2e951301245a4cd2741d712525ce022ad8fb51ac4472a45e6ec6b8708439", 0xd1}, {&(0x7f0000000200)="8c0f272d3e99d6141525ba935e324378356f6736bbef3440324d650233dc9fe88c56af47d01e277096ba1a68b68db35ee09180824c7ed5505980911157acf965c6b73ee5501118ff0becfed068c528c47fcf27a5dcbe587415dd40c01adc0448f447f92261c05e3ad05649b6e02af3e21be074e9b3b26f8e2cbc0e3c6335f9d959dcfca9b8e4c76400e35d45fb8ace1a41ff8f0aaa9194836ec9fec8bd27f854bd73d088cc7507eb7c65cd8f554f1ce03206ada5091b6184b9392009a9fd46eeb4bec29adf4e3941ba7034e4b8c8771e00", 0xd1}, {&(0x7f0000000300)="f786a3d8e29936d768448f103ce86668a09521aa4faea37795a27f737fe4d8c9a018ca55f60ee4455ef11a6b88006a51db7787aeaf0f3c24e4721b23579d35fe8398fa9a9ce6dc4734dc67ad936b5a7a38e08203776aa34cf18b517060eccbae65f46f1844902ab6d6b7b671e1f4a05d2d7f7e4118357c7c8c5e916318685ffefafaf2171d00e4a7455be0ef95c2b2fb8fe3344bf127f820dfe210a021", 0x9d}], 0x3}, {&(0x7f0000000400)=@in6={0xa, 0x4e23, 0x7fffffff, @remote={0xfe, 0x80, [], 0xbb}, 0x1f}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000440)="c6f5030b8f30e263ba8f6c92ef92b2cb3bf47b6035583911598bc6eef689bd94782d61e2ddbb37", 0x27}, {&(0x7f0000000480)="1d5c971f1ccbfce6eb51817aa7aeed712c34e6a8e0fd15872f4315d76295161edf1fae497b0c9dff996fc25211916cfde7ba7f4652a971cfd1d1a4d94fc26a08b87af2d825c45cf1b4e824fd20dd34e079dd5e43401543ca9ee8b01880bf49cb272a42d49f711369f42abed5c76d73236306142d5f8dc43807034cbcafd95fe7151b35583b33cd2c9ef600cdd2bf41418d620150dca4bae049dc464ca19f23dcafdfeeec00c6f362f028908c3d93d0062c42ba7806779f58250429e8b77f17757e3e8cfb53bb82f92c773f381f33b6e8c37f7cf91cb734f24da934a01991086e732ce0b2b68cb18d8cac41f1df", 0xed}, {&(0x7f0000000580)="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", 0xfb}], 0x3, &(0x7f00000007c0)=[@sndrcv={0x30, 0x84, 0x1, {0x2, 0xd9, 0x2, 0x8, 0x3, 0x8, 0x400, 0xa36, r2}}], 0x30, 0x20000000}, {&(0x7f0000000800)=@in6={0xa, 0x4e20, 0x4000000000000, @mcast1={0xff, 0x1, [], 0x1}, 0x2}, 0x1c, &(0x7f0000002e40)=[{&(0x7f0000000840)="b254d1cbd9e6c5f8646ed1d95e7a3f11f66bb372f12d3aa8014275820192dda83403aae0f28579e8d0bbd8865b1e2229285e916d747c5576b2ffbbe0c13a63dda2131a325bac96e3a34b9f6dd9eb47f78703860280c7c0b369a5bbe9f4abf1feb08cc1689934dd7bb29c57c66853150b6882a1fc92d6a6e06e98946b19be09b8a8c6745e44807360daf985705c596a3dac0d0a5d995310649795704b5431a368f45cf1a597b453c3543c890b9c282825e10ee1a91ba0f9a77b6cb8d4dec984e3abc8a74cb474f3", 0xc7}, {&(0x7f0000000940)="79135f5a720bc12d7193d117cbfe7c1bbdd318421317a226d0b83f0bd5dcc37cd999790e5c554c0c2ea3ef353c755658c6ee182a527ea7d91b19c89aa3fd8dffbfd7b8513cdf748259a1e1419887ab9479a7214b05d9810807ad94261f4fffd15015616e05663cc41d4eaa0619999e20fe28c68fe50d77974c9155ecf3de1fb0348d", 0x82}, {&(0x7f0000000a00)='L', 0x1}, {&(0x7f0000000a40)="82cef6002b8051c372ef46185c0f3df8cab0186df08729df4b3cc75fd99c180246a056b7554470c84d0bb5ba718b04d444b0f2f46951098f25d01b42d3a2a49bdaaea9e2bc08f007178454f4be372939d161e49d7d332baeb10d5d3a8b9c557e9cd049e4923325f4b7552872bd4f38cf3623dd144be9f8ffb6771d6f2e850b897b9d98cebbd6d257643561c67b97d759ec883e21764d087671c829c1999ef17da4eb5b2dd33fe3bcd169b244aeef37897674b0441bdf15bc1ec1f3fe540a83a48a998aec8fe25fad4adafc0141e3f46fcb30b5d716b67806c51207bcd000ed4e07c9b6d825f2cd2f0d", 0xe9}, {&(0x7f0000000b40)="128f2fa9abae49fbc26a01071a377b8f9bc7c6ce8a903e79c86528211a47d1cc37b07b146a3d5399d0e7f079b63243c9a4929b2134647d220a9a2b2f2b22c0bfc8f2b6444c06f081493dce2d4084269210d993b52c33d51d6770bfc8bb8ee1b0dc7d377f47aef4e1048f53eb9352b7f12ee0062eb13d576365653de795546cf651e67c9b050b5e39e3186faed7910e1c90c5d25ba151d71f6feaf2c967974be3362d383eb350f0fcdd4e2f37ac51eaa5bd1fe6d48467f6e5d87587b2a00be1147ef33d06e5da", 0xc6}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000001c40)="0820a2afdd4fef2a816c99b60df36987200cde3fe89eaeefeb4637bf4a3f691769c97491fd56bfa3a144302b558533fe5c896d22493aed666ebc2c8d1ba9b6ba58a49c9520ac2deef515853c254a59eb6a5829753af33cd0f5d0c51ca76ef847d16ce90686a1ab5435c854f58c9e1ec5270d34f996f5c84bc077d1a4cdcb5e14e3efb4ea4e986102e3c73c15c02755ca2ad0e2e58549254ac91630a7ae087cfdbb688cb76a61c3f762996c2e1b60dbbca1b5d0350beaf9057bad829cd9775bedd218310bbcf74f0bb0e9e9f010abdfcb057dadc67ffc2729b985998dfc73ace84aa061a6b51bf7db08afd837831605b9b56d99e8ab1ca2ab57", 0xf9}, {&(0x7f0000001d40)="33853130a1b59ac3d60cf88bbf5d659de872f313841ff7b7934d4cc964aa86f85135259e0cc5b1de013b2b4867751477fe358199384893b89cb132432b8d8c7d36dd3960dc6ef39ce24780d091e332ec003d4e01df8362b3020b5d24761d44d85668b69cfa943bb1454dcacd3799edcfe8a7cfc6459506504e528164fddb41d74568958d4b272f5c3a9b3df94e7956298ad8117c12fa75b0cfd2b361d603e0b1a35c6e7245ac709ef0b32e61c7341f82b585dfe6552a7185129cff7d41eee4a6e45b1621d7ab39c7319e4f0558b72871f9dc1be010367562deb8853a32c2d9c01739ab50e168e86435361537", 0xec}, {&(0x7f0000001e40)="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", 0x1000}], 0x9, 0x0, 0x0, 0x4}], 0x3, 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000002fc0)=0x5, 0x4) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:45 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 471.348720] team0 (unregistering): Port device team_slave_1 removed 00:15:45 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x101, 0x80) getsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) futex(&(0x7f0000000180), 0xc, 0x1, &(0x7f0000b7dff0)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x0) [ 471.415116] team0 (unregistering): Port device team_slave_0 removed 00:15:45 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="2e2f6367726f75702e63707500eac5bea7af575a45fddd5af3a7709295a69e7bc5fd0592bf2a4dc8ace908be8842141ca2a714ed0163d4afd8ac48123d4869e05556a93347d6a7430e03a5f2beb186f16bacf2e4dcdcf3b9ff1d99165ce38d996e7798fe471d9a0d81acd08788fcc9892a2487efcde7a649614b14ba1c18", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = dup(r1) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e20, 0x7f, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1d}}, 0x5}}, 0x200, 0x8, 0x1, 0x7fff, 0x52}, 0x98) sendfile(r1, r1, &(0x7f00000000c0), 0x6) [ 471.465257] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 471.527663] bond0 (unregistering): Releasing backup interface bond_slave_0 00:15:45 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x7, 0x1000, 0x3, 0x800, 0x3, 0x2, 0x119ee43, 0x4, 0x2, 0x4, 0x8, 0x7}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) 00:15:45 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 471.656381] bond0 (unregistering): Released all slaves [ 471.735937] IPVS: ftp: loaded support on port[0] = 21 [ 472.790698] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.797125] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.804557] device bridge_slave_0 entered promiscuous mode [ 472.845330] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.851722] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.858935] device bridge_slave_1 entered promiscuous mode [ 472.899246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 472.939564] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 473.052490] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 473.095999] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 473.275137] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 473.282553] team0: Port device team_slave_0 added [ 473.321422] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 473.328617] team0: Port device team_slave_1 added [ 473.368485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 473.410744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 473.453085] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 473.460282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 473.469413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 473.505313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 473.512527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 473.521558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 473.925315] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.931725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.938477] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.945090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.952556] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 474.911145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 475.467410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 475.611526] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 475.751513] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 475.757712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 475.765792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 475.900500] 8021q: adding VLAN 0 to HW filter on device team0 [ 476.744811] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 476.755824] syz-executor7 cpuset=syz7 mems_allowed=0 [ 476.761063] CPU: 0 PID: 24594 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 476.768019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.777379] Call Trace: [ 476.779978] dump_stack+0x185/0x1d0 [ 476.783619] dump_header+0x2cc/0x16f0 [ 476.787417] ? __msan_poison_alloca+0x15c/0x1d0 [ 476.792098] ? oom_kill_process+0x2e0/0x2160 [ 476.796507] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 476.801962] ? ___ratelimit+0x67f/0x760 [ 476.805947] oom_kill_process+0x341/0x2160 [ 476.810178] ? mem_cgroup_scan_tasks+0x289/0x610 [ 476.815889] out_of_memory+0x1700/0x1da0 [ 476.819971] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 476.825339] ? _cond_resched+0x8b/0xd0 [ 476.829236] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 476.834418] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 476.839791] pagefault_out_of_memory+0x57/0x110 [ 476.844457] mm_fault_error+0x460/0x7c0 [ 476.848452] __do_page_fault+0x1274/0x1a10 [ 476.852694] do_page_fault+0xb7/0x250 [ 476.856508] ? page_fault+0x8/0x30 [ 476.860043] page_fault+0x1e/0x30 [ 476.863498] RIP: 0033:0x407198 [ 476.866676] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 476.872033] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 476.879292] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 476.886550] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 476.893811] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 476.901072] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 476.908421] Task in /syz7 killed as a result of limit of /syz7 [ 476.914582] memory: usage 1196kB, limit 0kB, failcnt 44 [ 476.920035] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 476.926821] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 476.933044] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 476.952878] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 476.961667] [24594] 0 24594 17553 8392 118784 0 0 syz-executor7 [ 476.970548] Memory cgroup out of memory: Kill process 24594 (syz-executor7) score 8421000 or sacrifice child [ 476.980609] Killed process 24594 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB 00:15:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040)=0x1f, &(0x7f0000000080)=0x2) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:51 executing program 7: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8001, 0x80) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000080)) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000001ac0)=0x1, 0x4) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000001480)={'bridge0\x00', 0x4}) connect$inet(r0, &(0x7f0000000280)={0x2}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_getmulticast={0x14, 0x3a, 0x10, 0x70bd2d, 0x25dfdbfe, {0xa}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x20004004) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}], 0x2217) 00:15:51 executing program 4: r0 = socket$inet6(0xa, 0xfffffffffffffffe, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") membarrier(0x2, 0x0) 00:15:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:51 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000040)={0x0}) umount2(&(0x7f0000000000)='./file0\x00', 0x6) ppoll(&(0x7f0000000100)=[{r1}, {r1}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x30) r3 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x3, 0x200000) ioctl$EVIOCGSND(r3, 0x8040451a, &(0x7f0000000240)=""/253) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f00000001c0)={{0x2, 0x4e20, @loopback=0x7f000001}, {0x1}, 0x20, {0x2, 0x4e22, @multicast1=0xe0000001}, 'dummy0\x00'}) shutdown(r0, 0x2) 00:15:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0xa, &(0x7f00000001c0)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x400, 0x3f}) shutdown(r0, 0x0) 00:15:51 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:51 executing program 1: r0 = getpgrp(0x0) ptrace(0x4218, r0) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x0, 0x2710}, {0x77359400}}, 0x0) 00:15:51 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adabbfef855d72abb637d460fc6fb5a9eec5535b119c9dfbde481d323a5af63450000000d57e229f02c217a0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be440000000000000001c122287842253398a04d99ca8680deb20632644bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0xffffffffffffff0a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4480, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x40, 0x8ad8, 0x7fffffff, 0x9}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e21, 0x4, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xe}}, 0x4}}, 0x6, 0x8000}, &(0x7f0000000300)=0x90) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200100, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r2, 0x4}, &(0x7f0000000140)=0x8) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x80) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r2, @in={{0x2, 0x4e22, @rand_addr=0x6}}, 0x4, 0x7}, &(0x7f0000000400)=0x90) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f0000000040)=""/71) 00:15:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0x46, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x16, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xc0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x14) 00:15:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000740)=[{&(0x7f0000000240)="dda93ea4bfafbcc8a9850b227c4a23f3bdc8681e6568a6299d27ee802989bb20bcafb2c2ca94f8c19ddc5517401e6c812ce7bfa095f0657bc8632566544c37b045c85eede57f430a886f470d6ba82dfe05b16ec8e19ff2aaf130041ec72d9312881a5736958f622f756e8fd79c931e3d0554d1a42915c52e4a9e0a63e82950cc0a9b5306e28343ebaf2e4b69d5f196a0eeedc58c96", 0x95}, {&(0x7f0000000300)="dbd149c30da31a8484b562e3ca48730e70fc75b07c1b0f4e835f59aa56d9648a29ae9d4f4efadd38647557dfc93f1b2e01d2a8d7594f0e2f6a74d7174289510335c95e720fc5096329b40b70aa659985766de23b833d51358dacb26c289528376309510c2594144bc16f6a9467638ef253c6a2a30c1e04", 0x77}, {&(0x7f0000000380)="e11d4c1fe5e3385f3cf7355e69f38db06a309572250ff90a2b32a10a4a9aae251a2f0d80571c6893881816c52a3fdb2bab885281396d687c959bebe3fe41928ba32504fea5130ba62f270ad640009dbbc6b09049de3385b793226b", 0x5b}, {&(0x7f0000000400)="ef0838e690a2388d849491e4a2cd1945023894e91f37fc97fa5264ab025a7698d077e3c3911277bee9e49d31db7649a1d266a6d4c63ef851077ef290a7ef4f5043ba3f9fe95fcb", 0x47}, {&(0x7f0000000480)="6eb54e54f4d719ffc0304bf68b203189d41277f7db64fd66c1a9ed30b0baad04fdb3e18e708ff5759ca45119d8d027becae1488e64897eb919538866124ec2b11405786ce63c7cc5cd8502909d3de84d649cb360849c9fa14290cd45e824bd04c19ca7ce3d31c54acf0ee5ea71df862afafaff2ea5", 0x75}, {&(0x7f0000000500)="bc126117de171434f39735eb923b364fd6350ec888370b9c03922df5df71278d67e8948c3011bbb906d4313c1df5794da8d66f35e2c9c3ae61dcb42b3a49862064f35a832fcef6b2845c23df82a295ca030fc5e798526ccc8645326e3aba0e37b283647ba9bfccedfc761bc8d069aec3cf80bcab217ef8f602f36c0d79e9e1f2cfd16b57428f1f9744b26f2295c6b77ce456425af71ff45a06a4e324dd2c916b373cc5841d9bb436f7b71fb0", 0xac}, {&(0x7f00000005c0)="c48e4d33cc454136923ef1f0ade22cf845818c158b9217a56e339e999c2b0c9b08a3033eceb56c315ac1d022117a28e8014ccb492cdeace676a27276133a02ae7e79d706b7e8ac0e2740ec0693457e278c40f4b444e6fc2dfb3089", 0x5b}, {&(0x7f0000000640)="59723e6a0210e5c76d87887daeba690417261678888463e1c034b1cc34d3679c7f0104063cd92857fe20987449ab599ad4df2a137e0603b88d8101aea7e7c119ac6199b37aae145d8b19a1f406ab8f8756808ced2f78282af5f518aa883519ce4a8500e44d13de2feccd2af83a55790bb7b4b367ef555a24e1b020230b01a82294174f29e18f8a971be88c6d531dfc46928dd50da6851c3cd2fd2fad78ef988986f2f67194a3cb26e5bc1a32ae895c63210bf9f3940531f75d57b8f47b228f218858769a", 0xc4}], 0x8, &(0x7f0000000000)=[@rights={0x20, 0x1, 0x1, [r1, r0, r0]}], 0x20, 0x8000}, 0x20000000) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:15:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) 00:15:51 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x4, &(0x7f0000000040)={0x0}) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x8000, 0x0) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000140)=0x8a) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r1, 0x1) 00:15:51 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 477.364323] device bridge_slave_1 left promiscuous mode [ 477.370182] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.460155] device bridge_slave_0 left promiscuous mode [ 477.466088] bridge0: port 1(bridge_slave_0) entered disabled state 00:15:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r0, &(0x7f0000000000), 0xfffffffffffffcf3, 0x0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @loopback=0x7f000001}}, 0x80) r1 = getpgrp(0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) tgkill(r1, r2, 0x3a) r3 = dup3(r0, r0, 0x80000) ioctl$TIOCEXCL(r3, 0x540c) [ 477.641104] team0 (unregistering): Port device team_slave_1 removed [ 477.680214] team0 (unregistering): Port device team_slave_0 removed [ 477.712293] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 477.756956] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 477.817268] bond0 (unregistering): Released all slaves [ 477.830577] IPVS: ftp: loaded support on port[0] = 21 [ 478.840119] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.846538] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.853882] device bridge_slave_0 entered promiscuous mode [ 478.893592] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.900063] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.907444] device bridge_slave_1 entered promiscuous mode [ 478.948164] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 478.990068] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 479.111829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 479.154212] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 479.194810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 479.201945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 479.349692] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 479.356897] team0: Port device team_slave_0 added [ 479.396448] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 479.403708] team0: Port device team_slave_1 added [ 479.444461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 479.488823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 479.531987] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 479.539378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 479.547840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 479.585691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 479.592900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 479.601527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 480.016884] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.023306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 480.030084] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.036493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 480.044073] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 480.063149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 481.541246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 481.690494] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 481.835791] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 481.842111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 481.849581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 481.987593] 8021q: adding VLAN 0 to HW filter on device team0 [ 482.835663] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 482.846667] syz-executor7 cpuset=syz7 mems_allowed=0 [ 482.851862] CPU: 1 PID: 24915 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 482.858803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.868145] Call Trace: [ 482.870734] dump_stack+0x185/0x1d0 [ 482.874357] dump_header+0x2cc/0x16f0 [ 482.878151] ? __msan_poison_alloca+0x15c/0x1d0 [ 482.882819] ? oom_kill_process+0x2e0/0x2160 [ 482.887314] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 482.892766] ? ___ratelimit+0x67f/0x760 [ 482.896770] oom_kill_process+0x341/0x2160 [ 482.901016] ? mem_cgroup_scan_tasks+0x289/0x610 [ 482.905778] out_of_memory+0x1700/0x1da0 [ 482.909844] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 482.915199] ? _cond_resched+0x8b/0xd0 [ 482.919098] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 482.924281] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 482.929654] pagefault_out_of_memory+0x57/0x110 [ 482.934320] mm_fault_error+0x460/0x7c0 [ 482.938310] __do_page_fault+0x1274/0x1a10 [ 482.942548] do_page_fault+0xb7/0x250 [ 482.946339] ? page_fault+0x8/0x30 [ 482.949869] page_fault+0x1e/0x30 [ 482.953315] RIP: 0033:0x407198 [ 482.956501] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 482.961854] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 482.969113] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 482.976375] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 482.983631] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 482.990888] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 482.998978] Task in /syz7 killed as a result of limit of /syz7 [ 483.005096] memory: usage 1196kB, limit 0kB, failcnt 52 [ 483.010524] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 483.017326] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 483.023523] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 483.043371] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 483.052175] [24915] 0 24915 17553 8391 118784 0 0 syz-executor7 [ 483.061085] Memory cgroup out of memory: Kill process 24915 (syz-executor7) score 8420000 or sacrifice child [ 483.071166] Killed process 24915 (syz-executor7) total-vm:70212kB, anon-rss:76kB, file-rss:33488kB, shmem-rss:0kB [ 483.102537] oom_reaper: reaped process 24915 (syz-executor7), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB 00:15:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) arch_prctl(0x1001, &(0x7f0000000040)="26bb16db6d95de9b91a0bbef7d588116547ab968c69690c2f863322397e1872310e1d813e16ebc75bc5b3becdd1463c6675804eddfbf1b35d778c68921c61c956a531b3e41") 00:15:57 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0xb, 0x408000) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000180)) r1 = userfaultfd(0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x42800) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x30}) unshare(0x2000400) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x41}) 00:15:57 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:57 executing program 7: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:15:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="2900000000000000000000000000000000000000aa00000000000000000000ffffac1414bb00000000000000000000000000000000000000005144aaaaaaaaaa0000000000000000000000000017e867c369caaaaaaaaaaaaa0000000000000000000000000000000000000000000000000000000040a9aaaaaa00000000000000000000000000b23d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sit0\x00'}, 0x10) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0x7fff, 0x1, 0x7, 0x46, r2}, &(0x7f0000000240)=0x10) 00:15:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:15:57 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2000000000000156, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x111001, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0x21, &(0x7f00000001c0)=""/133, &(0x7f0000000140)=0x85) write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './file0', [{0x20, 'trusted+'}, {0x20, '^'}, {0x20, '/dev/null\x00'}, {0x20, 'vmnet1security'}], 0xa, "2a16986bee24e8e99d52d768514451b21baa1e1d913d0c450e15bcfd7b9e284be32f92fef6c872af8550d508a07be955aed64cca75acbd7cf4d406a81a55de75219101a45c81575cdf5e637168d54dfb66f4f6f975c7f6c207d3f17754ce98e965d090544776024e5bcae3033f9d9180bc7863f376d5617a82cbf61148f867461cff7ca7ad3b2267b705653726d71dabd23869d05fdad4f69cff3bfd566ce5a3112ce508cb2367f6502ba36c60889a5d91a29b1a2dd5f679b8a336b4f710fb0368866676bd66223d8a58b378928b0f"}, 0xff) 00:15:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x800, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000280)={'veth1\x00', 0x200}) r4 = getpgid(0x0) r5 = fcntl$dupfd(r1, 0x0, r1) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f00000001c0)={'security\x00'}, &(0x7f0000000140)=0x54) sched_setaffinity(r4, 0x8, &(0x7f0000000000)=0x7) 00:15:57 executing program 6: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x60000) fchmod(r0, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r2}, {r1}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r1, 0x2) 00:15:57 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, &(0x7f00000ddff8), 0x102002f01) 00:15:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102002f01) [ 483.398505] device bridge_slave_1 left promiscuous mode [ 483.404318] bridge0: port 2(bridge_slave_1) entered disabled state 00:15:57 executing program 1: syz_emit_ethernet(0x1e, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@generic={0x88ca, "6e8a2682bb025242ea711fd069e70ca6"}}}, &(0x7f0000000180)) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x498, 0x138, 0x278, 0x278, 0x3b0, 0x3b0, 0x3b0, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x8001, 'syz1\x00', 0x6}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="e52b4447cd9a", @mac, @loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}, 0x2, 0x1}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x1, 0x9, 0x3}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4e8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x800, 0x117) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000006c0)={r2, 0x13}, &(0x7f0000000700)=0x8) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40000) 00:15:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:15:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 483.469312] device bridge_slave_0 left promiscuous mode [ 483.475137] bridge0: port 1(bridge_slave_0) entered disabled state 00:15:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) process_vm_writev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)=""/144, 0x90}], 0x1, &(0x7f0000000440)=[{&(0x7f0000000400)=""/7, 0x7}], 0x1, 0x0) [ 483.659768] team0 (unregistering): Port device team_slave_1 removed [ 483.698551] team0 (unregistering): Port device team_slave_0 removed 00:15:57 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x0) [ 483.748938] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 483.796140] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 483.895703] bond0 (unregistering): Released all slaves [ 483.957479] IPVS: ftp: loaded support on port[0] = 21 [ 484.960890] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.967326] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.974689] device bridge_slave_0 entered promiscuous mode [ 485.014222] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.020604] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.027961] device bridge_slave_1 entered promiscuous mode [ 485.067508] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 485.108490] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 485.227247] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 485.269554] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 485.310564] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 485.317507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 485.359142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 485.366093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 485.482433] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 485.489644] team0: Port device team_slave_0 added [ 485.529697] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 485.536894] team0: Port device team_slave_1 added [ 485.577213] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 485.619870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 485.660913] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 485.668199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 485.677246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 485.712225] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 485.719357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 485.728474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 486.140054] bridge0: port 2(bridge_slave_1) entered blocking state [ 486.146449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 486.153215] bridge0: port 1(bridge_slave_0) entered blocking state [ 486.159600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 486.167167] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 486.207736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 487.704744] 8021q: adding VLAN 0 to HW filter on device bond0 [ 487.854298] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 487.999182] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 488.005394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 488.013680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 488.155208] 8021q: adding VLAN 0 to HW filter on device team0 [ 489.025252] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 489.036277] syz-executor7 cpuset=syz7 mems_allowed=0 [ 489.041530] CPU: 1 PID: 25232 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 489.048480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.057827] Call Trace: [ 489.060420] dump_stack+0x185/0x1d0 [ 489.064050] dump_header+0x2cc/0x16f0 [ 489.067845] ? __msan_poison_alloca+0x15c/0x1d0 [ 489.072517] ? oom_kill_process+0x2e0/0x2160 [ 489.076927] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 489.082381] ? ___ratelimit+0x67f/0x760 [ 489.086364] oom_kill_process+0x341/0x2160 [ 489.090611] ? mem_cgroup_scan_tasks+0x289/0x610 [ 489.095369] out_of_memory+0x1700/0x1da0 [ 489.099434] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 489.104795] ? _cond_resched+0x8b/0xd0 [ 489.108705] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 489.113889] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 489.119279] pagefault_out_of_memory+0x57/0x110 [ 489.123943] mm_fault_error+0x460/0x7c0 [ 489.127934] __do_page_fault+0x1274/0x1a10 [ 489.132186] do_page_fault+0xb7/0x250 [ 489.135990] ? page_fault+0x8/0x30 [ 489.139533] page_fault+0x1e/0x30 [ 489.143005] RIP: 0033:0x407198 [ 489.146197] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 489.151551] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 489.158808] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 489.166066] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 489.173325] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 489.180582] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 489.188055] Task in /syz7 killed as a result of limit of /syz7 [ 489.194121] memory: usage 1196kB, limit 0kB, failcnt 60 [ 489.199537] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 489.206352] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 489.212549] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 489.232368] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 489.241199] [25232] 0 25232 17553 8393 118784 0 0 syz-executor7 [ 489.250092] Memory cgroup out of memory: Kill process 25232 (syz-executor7) score 8422000 or sacrifice child [ 489.260161] Killed process 25232 (syz-executor7) total-vm:70212kB, anon-rss:84kB, file-rss:33488kB, shmem-rss:0kB [ 489.291275] oom_reaper: reaped process 25232 (syz-executor7), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB 00:16:03 executing program 7: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:03 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x0) 00:16:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0xffffffffffffff01, 0x5, 0x8, 0x1, 0x200, 0x1, 0x2, 0x8, 0x2, 0x6, 0x81}) ioctl$VT_RELDISP(r0, 0x5605) 00:16:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='highspeed\x00', 0xa) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x7, 0x10, 0x8, 0x3}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000080)={r1, 0x80000000}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) 00:16:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000140)=0x4eb8) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:16:03 executing program 6: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000001340)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/198, 0xc6}, {&(0x7f00000002c0)=""/119, 0x77}, {&(0x7f0000000340)=""/78, 0x4e}], 0x3, 0x0, 0x0, 0x100000000}, 0xffffffff}, {{&(0x7f00000003c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000440)=""/80, 0x50}, {&(0x7f00000004c0)=""/166, 0xa6}, {&(0x7f0000000580)=""/42, 0x2a}, {&(0x7f00000005c0)=""/197, 0xc5}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/23, 0x17}, {&(0x7f0000000780)=""/40, 0x28}], 0x7, 0x0, 0x0, 0x1000}, 0x101}, {{&(0x7f0000000840)=@in={0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000d00)=[{&(0x7f00000008c0)=""/114, 0x72}, {&(0x7f0000000940)=""/40, 0x28}, {&(0x7f0000000980)=""/133, 0x85}, {&(0x7f0000000a40)=""/8, 0x8}, {&(0x7f0000000a80)=""/51, 0x33}, {&(0x7f0000000ac0)=""/180, 0xb4}, {&(0x7f0000000b80)=""/29, 0x1d}, {&(0x7f0000000bc0)=""/20, 0x14}, {&(0x7f0000000c00)=""/197, 0xc5}], 0x9, &(0x7f0000000dc0)=""/154, 0x9a, 0x5}, 0xffffffffffffff9a}, {{&(0x7f0000000e80)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000f00)=""/68, 0x44}], 0x1, &(0x7f0000000fc0)=""/227, 0xe3, 0x80000000}, 0xbaae}, {{&(0x7f00000010c0)=@un=@abs, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/162, 0xa2}, {&(0x7f0000001200)=""/164, 0xa4}, {&(0x7f00000012c0)=""/24, 0x18}], 0x3, 0x0, 0x0, 0x6}, 0xb2ee}], 0x5, 0x10123, &(0x7f0000001480)={0x0, 0x989680}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) chdir(&(0x7f00000014c0)='./file0\x00') recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)=""/233, 0xe9}], 0x1004, &(0x7f0000002200)=""/4096, 0x1000}, 0x0) sendmsg(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100), 0x49, &(0x7f0000000200)}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r2}, {r1}], 0x2, &(0x7f0000000080)={r4}, &(0x7f00000000c0), 0x8) shutdown(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000001500)=0x81, 0x4) 00:16:03 executing program 4: r0 = socket(0x10, 0x803, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x20002, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) getresgid(&(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000fa3000)={&(0x7f0000d0b000)=@ax25, 0x10, &(0x7f00002e6f80), 0x0, &(0x7f0000878000)}, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") recvmmsg(r0, &(0x7f0000001600), 0x40000000000022f, 0x0, &(0x7f0000001680)={0x0, 0x989680}) 00:16:03 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=@delneigh={0x1c, 0x1d}, 0x1c}, 0x1}, 0x0) 00:16:03 executing program 0 (fault-call:5 fault-nth:0): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7ff, 0x282800) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)=0xa0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 489.670546] device bridge_slave_1 left promiscuous mode [ 489.676345] bridge0: port 2(bridge_slave_1) entered disabled state 00:16:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 489.742226] device bridge_slave_0 left promiscuous mode [ 489.748080] bridge0: port 1(bridge_slave_0) entered disabled state [ 489.788183] FAULT_INJECTION: forcing a failure. [ 489.788183] name failslab, interval 1, probability 0, space 0, times 0 [ 489.799604] CPU: 0 PID: 25520 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 489.806557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.815938] Call Trace: [ 489.818577] dump_stack+0x185/0x1d0 [ 489.822245] ? kmsan_set_origin_inline+0x6b/0x120 [ 489.827160] should_fail+0x87b/0xab0 [ 489.830929] __should_failslab+0x278/0x2a0 [ 489.835214] should_failslab+0x29/0x70 [ 489.839157] __kmalloc+0xbe/0x350 [ 489.842653] ? kmsan_set_origin_inline+0x6b/0x120 [ 489.847531] ? alloc_pipe_info+0xb8/0x8c0 [ 489.851716] alloc_pipe_info+0xb8/0x8c0 [ 489.855735] ? splice_direct_to_actor+0x63/0x1040 [ 489.860628] ? do_splice_direct+0x335/0x540 [ 489.865002] splice_direct_to_actor+0xd63/0x1040 [ 489.869809] ? do_splice_direct+0x540/0x540 [ 489.874181] ? security_file_permission+0x26d/0x480 [ 489.879240] ? rw_verify_area+0x35e/0x580 [ 489.883452] do_splice_direct+0x335/0x540 [ 489.887666] ? security_file_permission+0x1f0/0x480 [ 489.892730] do_sendfile+0x107b/0x1e40 [ 489.896707] __x64_sys_sendfile64+0x218/0x390 [ 489.901249] ? __ia32_sys_sendfile+0x160/0x160 [ 489.905860] do_syscall_64+0x15b/0x230 [ 489.909791] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 489.914707] IPVS: ftp: loaded support on port[0] = 21 [ 489.915000] RIP: 0033:0x455ab9 [ 489.915016] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 489.915048] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 00:16:03 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x404000) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000080)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) 00:16:03 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d137e637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0xc3, @time}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000340)) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x0) dup3(r0, r0, 0x80000) r2 = dup2(r1, r0) fcntl$setstatus(r1, 0x4, 0x42800) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x25, &(0x7f0000000000)={@loopback=0x7f000001, @broadcast=0xffffffff, @broadcast=0xffffffff}, 0xc) [ 489.915065] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 489.915089] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 489.953016] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 489.960308] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000000 00:16:04 executing program 0 (fault-call:5 fault-nth:1): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 490.057005] team0 (unregistering): Port device team_slave_1 removed [ 490.077673] team0 (unregistering): Port device team_slave_0 removed [ 490.101132] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 490.141356] FAULT_INJECTION: forcing a failure. [ 490.141356] name failslab, interval 1, probability 0, space 0, times 0 [ 490.152752] CPU: 1 PID: 25541 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 490.159707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.169086] Call Trace: [ 490.171725] dump_stack+0x185/0x1d0 [ 490.175385] ? kmsan_set_origin_inline+0x6b/0x120 [ 490.180294] should_fail+0x87b/0xab0 [ 490.184072] __should_failslab+0x278/0x2a0 [ 490.188367] should_failslab+0x29/0x70 [ 490.192308] __kmalloc+0xbe/0x350 [ 490.195808] ? kmsan_set_origin_inline+0x6b/0x120 [ 490.200704] ? alloc_pipe_info+0x561/0x8c0 [ 490.204982] alloc_pipe_info+0x561/0x8c0 [ 490.209108] splice_direct_to_actor+0xd63/0x1040 [ 490.213917] ? do_splice_direct+0x540/0x540 [ 490.218293] ? security_file_permission+0x26d/0x480 [ 490.223355] ? rw_verify_area+0x35e/0x580 [ 490.227568] do_splice_direct+0x335/0x540 [ 490.231809] ? security_file_permission+0x1f0/0x480 [ 490.236871] do_sendfile+0x107b/0x1e40 [ 490.240843] __x64_sys_sendfile64+0x218/0x390 [ 490.245386] ? __ia32_sys_sendfile+0x160/0x160 [ 490.250004] do_syscall_64+0x15b/0x230 [ 490.253930] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 490.259140] RIP: 0033:0x455ab9 [ 490.262345] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 490.270101] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 490.277408] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 490.284700] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 490.291993] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 490.299282] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000001 [ 490.316660] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 490.388592] bond0 (unregistering): Released all slaves [ 490.928884] ALSA: seq fatal error: cannot create timer (-22) [ 490.989660] ALSA: seq fatal error: cannot create timer (-22) [ 491.428601] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.435085] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.442475] device bridge_slave_0 entered promiscuous mode [ 491.483640] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.490088] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.497432] device bridge_slave_1 entered promiscuous mode [ 491.538240] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 491.579185] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 491.696243] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 491.739776] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 491.928718] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 491.935954] team0: Port device team_slave_0 added [ 491.977224] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 491.984679] team0: Port device team_slave_1 added [ 492.025633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 492.068715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 492.111111] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 492.118289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 492.127438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 492.163327] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 492.170509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 492.179702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 492.602158] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.608554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 492.615306] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.621681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 492.629251] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 493.472357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 494.170479] 8021q: adding VLAN 0 to HW filter on device bond0 [ 494.313847] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 494.457176] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 494.463386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 494.470839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 494.610080] 8021q: adding VLAN 0 to HW filter on device team0 [ 495.450300] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 495.461528] syz-executor7 cpuset=syz7 mems_allowed=0 [ 495.466732] CPU: 0 PID: 25529 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 495.473677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.483027] Call Trace: [ 495.485620] dump_stack+0x185/0x1d0 [ 495.489244] dump_header+0x2cc/0x16f0 [ 495.493043] ? __msan_poison_alloca+0x15c/0x1d0 [ 495.497714] ? oom_kill_process+0x2e0/0x2160 [ 495.502124] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 495.507579] ? ___ratelimit+0x67f/0x760 [ 495.511571] oom_kill_process+0x341/0x2160 [ 495.515813] ? mem_cgroup_scan_tasks+0x289/0x610 [ 495.520572] out_of_memory+0x1700/0x1da0 [ 495.524639] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 495.530011] ? _cond_resched+0x8b/0xd0 [ 495.533916] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 495.539111] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 495.544501] pagefault_out_of_memory+0x57/0x110 [ 495.549174] mm_fault_error+0x460/0x7c0 [ 495.553162] __do_page_fault+0x1274/0x1a10 [ 495.557402] do_page_fault+0xb7/0x250 [ 495.561200] ? page_fault+0x8/0x30 [ 495.564731] page_fault+0x1e/0x30 [ 495.568171] RIP: 0033:0x407198 [ 495.571348] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 495.576704] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 495.583969] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 495.591231] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 495.598498] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 495.605755] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 495.613119] Task in /syz7 killed as a result of limit of /syz7 [ 495.619301] memory: usage 1196kB, limit 0kB, failcnt 68 [ 495.624716] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 495.631538] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 495.637726] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 495.657590] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 495.666342] [25529] 0 25529 17553 8392 118784 0 0 syz-executor7 [ 495.675232] Memory cgroup out of memory: Kill process 25529 (syz-executor7) score 8421000 or sacrifice child [ 495.685269] Killed process 25529 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB 00:16:09 executing program 0 (fault-call:5 fault-nth:2): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x242080, 0x0) 00:16:09 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) fcntl$dupfd(r1, 0x406, r1) shutdown(r1, 0x1) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/117, &(0x7f0000000000)=0x75) 00:16:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) signalfd(r0, &(0x7f0000000380)={0x8553}, 0x8) r3 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x180) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r4, 0x4) getdents64(r3, &(0x7f0000000140), 0x0) mq_timedsend(r3, &(0x7f00000001c0)="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", 0xff, 0x0, 0x0) 00:16:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000001c0)={0xffffffffffffffff, 0x3, 0x80000000, 0x2, 0x8}) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000440)={'nat\x00', 0x1000, "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"}, &(0x7f0000001480)=0x1024) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x37, 0x0, 0x0, 0x1c5f70}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x16) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2=0xe0000002}}, 0x9b30, 0xb4f, 0x3, 0x6, 0x6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r2, 0x8001}, 0x8) r3 = msgget$private(0x0, 0x15) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000280)=""/249) 00:16:09 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x7) fcntl$dupfd(r0, 0x40a, 0xffffffffffffffff) 00:16:09 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="2957e1311f160677671070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x88000, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000240)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000700)={0x1d}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f0000001fc8)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x4}, 0x0, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}, 0x1}, 0x0) geteuid() [ 495.881959] FAULT_INJECTION: forcing a failure. [ 495.881959] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 495.894058] CPU: 1 PID: 25825 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 495.901005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.910374] Call Trace: [ 495.912992] dump_stack+0x185/0x1d0 [ 495.916671] should_fail+0x87b/0xab0 [ 495.920426] __alloc_pages_nodemask+0x600/0x5cc0 [ 495.925198] ? __kernel_text_address+0x34/0xe0 [ 495.929793] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 495.935245] ? __save_stack_trace+0x90d/0xb00 [ 495.939766] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 495.945146] ? __module_address+0x6a/0x600 [ 495.949393] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 495.954758] ? __bitmap_intersects+0x173/0x300 [ 495.959366] alloc_pages_vma+0xcc6/0x17f0 [ 495.963532] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 495.968570] ? find_lock_entry+0xc8/0x720 [ 495.972742] ? find_get_entry+0x7ef/0x820 [ 495.976907] ? shmem_getpage_gfp+0x61f/0x59c0 [ 495.981418] ? shmem_getpage_gfp+0x61f/0x59c0 [ 495.985940] shmem_getpage_gfp+0x3991/0x59c0 [ 495.990374] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 495.995059] ? __wake_up_common_lock+0x10c/0x370 [ 495.999832] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 496.005301] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 496.010687] ? vmalloc_to_page+0x50b/0x630 [ 496.015045] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 496.020447] shmem_file_read_iter+0x508/0x1180 [ 496.025044] ? __fsnotify_parent+0x75/0x560 [ 496.029384] ? security_file_permission+0x390/0x480 [ 496.034417] ? kmsan_set_origin_inline+0x6b/0x120 [ 496.039276] ? shmem_file_llseek+0xd80/0xd80 [ 496.043703] generic_file_splice_read+0x5d7/0x900 [ 496.048575] ? splice_shrink_spd+0x100/0x100 [ 496.053020] splice_direct_to_actor+0x4cb/0x1040 [ 496.057795] ? do_splice_direct+0x540/0x540 [ 496.062158] do_splice_direct+0x335/0x540 [ 496.066347] ? security_file_permission+0x1f0/0x480 [ 496.071380] do_sendfile+0x107b/0x1e40 [ 496.075312] __x64_sys_sendfile64+0x218/0x390 [ 496.080002] ? __ia32_sys_sendfile+0x160/0x160 [ 496.084608] do_syscall_64+0x15b/0x230 [ 496.088510] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 496.093697] RIP: 0033:0x455ab9 [ 496.096882] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 496.104596] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 496.112125] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 496.119392] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 496.126661] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 496.133931] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000002 00:16:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/179, 0xb3}, {&(0x7f0000000100)=""/234, 0xea}, {&(0x7f0000000200)=""/75, 0x4b}, {&(0x7f0000000280)=""/157, 0x9d}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000003c0)=""/177, 0xb1}, {&(0x7f0000000480)=""/150, 0x96}, {&(0x7f0000000540)=""/225, 0xe1}], 0x8, &(0x7f00000006c0)=""/183, 0xb7, 0x9}, 0x3f}, {{&(0x7f0000000780)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000800)=""/31, 0x1f}], 0x1, &(0x7f0000000880)=""/37, 0x25, 0x3}, 0x7fffffff}, {{&(0x7f00000008c0)=@ipx, 0x80, &(0x7f0000003b00)=[{&(0x7f0000000940)=""/93, 0x5d}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/246, 0xf6}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/53, 0x35}, {&(0x7f0000002b00)=""/4096, 0x1000}], 0x6, &(0x7f0000003b80), 0x0, 0x4}, 0x7}, {{0x0, 0x0, &(0x7f0000003f40)=[{&(0x7f0000003bc0)=""/191, 0xbf}, {&(0x7f0000003c80)=""/47, 0x2f}, {&(0x7f0000003cc0)=""/114, 0x72}, {&(0x7f0000003d40)=""/131, 0x83}, {&(0x7f0000003e00)=""/142, 0x8e}, {&(0x7f0000003ec0)=""/103, 0x67}], 0x6, &(0x7f0000003fc0)=""/196, 0xc4, 0x80000000}, 0x200}, {{&(0x7f00000040c0)=@xdp, 0x80, &(0x7f0000004480)=[{&(0x7f0000004140)=""/27, 0x1b}, {&(0x7f0000004180)=""/239, 0xef}, {&(0x7f0000004280)=""/198, 0xc6}, {&(0x7f0000004380)=""/189, 0xbd}, {&(0x7f0000004440)=""/12, 0xc}], 0x5, &(0x7f0000004500)=""/91, 0x5b, 0xff}, 0x7}, {{&(0x7f0000004580)=@in, 0x80, &(0x7f0000004740)=[{&(0x7f0000004600)=""/212, 0xd4}, {&(0x7f0000004700)=""/12, 0xc}], 0x2, &(0x7f0000004780)=""/213, 0xd5, 0x80000001}, 0x9e4c}, {{&(0x7f0000004880)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000004a00)=[{&(0x7f0000004900)=""/82, 0x52}, {&(0x7f0000004980)=""/75, 0x4b}], 0x2, &(0x7f0000004a40)=""/151, 0x97, 0x8}, 0x5}], 0x7, 0x40000002, 0x0) getresuid(&(0x7f0000004d00), &(0x7f0000004d40)=0x0, &(0x7f0000004d80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004dc0)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000004ec0)=0xe8) timer_create(0x7, &(0x7f0000007800)={0x0, 0x1d, 0x0, @thr={&(0x7f0000003b80)="42d25654d67eb83c84210886ad1d3fa205aaaaae439862b336579e01e2bf3911df7f60082fba6811d685c6e772d9b695e0", &(0x7f0000007700)="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"}}, &(0x7f0000007840)=0x0) timer_delete(r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004f00)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000005000)=0xe8) sendmsg$nl_generic(r1, &(0x7f00000076c0)={&(0x7f0000004cc0)={0x10, 0x0, 0x0, 0x108000}, 0xc, &(0x7f0000007680)={&(0x7f0000005040)={0x2614, 0x3b, 0x120, 0x70bd2a, 0x25dfdbfe, {0x19}, [@generic="c1a9d60a6d055820e54e15e73780e5d32d2cf64bfe06a6b877a66affdad0085521830e8524295eef8c077d9e08280bfd85f80e0307f095f053", @nested={0x11c8, 0x6f, [@typed={0xc, 0x13, @u64=0x6}, @generic="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", @typed={0x10, 0x6e, @str='/dev/ptmx\x00'}, @generic="9f3ebc2c57afaf15ba1075c6d53f2a4270d8bba5a59d0bac5374cf8672044d9faa44fe4e0d44580e55f2962b28ed438a8ed3255cf91a2d727100eca19518aec5cd232cee1bed8528f57e7618e732d8995e3117c1bfab895eac2c4ef37463fa2cc4f095997f040da04b906a9ec8729fea92a98ce67a1d79761b4b8f8a01a4652d12a7e7723a54abe3e4945d5c910a4820054b03c19676208dc50210bf72d2b53bcf8d9130", @generic="6857e1e491660d2400b9566bd38c2fe9754e7f9901632b63506b8e842a562dd045aaa4d8c026ed21a7d2089040ec0f01ecd67d72e178caeb115a038b3a1a984569c8ec8d185a7316fa234490aa4c9c54167c5a166cf112ae08d9b82c9684971150040d6ba09911e29e2d0a175a94e91177", @generic="fed6a2fc6b1bd18adcb46b4ca3343939d92a92635bf3a2e41466ae3a7b9d38beabb9bd01132d90f82cb84b8749f83e93c91d804e7e2b3d6083d01bb36c55e8d2cc46fbeb838fd073d10f63cc5087260659ec5351dc144ffb6ba2a9d7dc0dd89a7c6e6de60d601734a5ae47dcba5d72842ddb7d986f9e64dfd5fbd46f3033c605d8b3", @typed={0x8, 0x8d, @uid=r2}, @typed={0x8, 0x57, @ipv4=@broadcast=0xffffffff}]}, @typed={0x8, 0x31, @uid=r3}, @nested={0x274, 0x52, [@generic="1f4e8a5963a7406f8da79ef71cd4dffe57dc9816f1d6a38e4357ef2d17a604ddb39068531464372934c613c2f684dcb69c60ac7987b1bec23d992330692fabb047d07aca7075dc7d8b59bbbbd5c2493ca294ffdb68dca599475996bcf5c9f2aa118177d43206cc934af6364e9c082495caf0a321aa9c7d6ccd0a1091af738d365c071f24eebce86ab83280316d7dcbafa80c713e5c5c4b76196f1a", @typed={0x8, 0x6b, @u32=0x2945}, @typed={0x14, 0x1d, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @generic="4a1419468a436692ca52fac380fc65afa9deec0b8c8a33a01c2fe594521836584641f9614147c01b0c6ef229323123665d3c4f63eb6de3e5957eef1ff0e56319b94b1ddc71832015280768e979bc072f1c6c2d2a97ab5eafaa010603c72cbc1ee49f712a91d4e67e68d4a7e7c85884f88b9543c1b5690c6bd00bb664b08811761ddd1ac7c4fce41535e8196a6968da0d086bd635f2219d79061d6a9b5aa79152352ab56c8011366b67dfb3e09e0084e1570a04849872f7769677", @generic="4dcbf61f9186dd9eabfa63c913f0651c6096bddf2ed06eeabe52f8d442ffa143f7d5a3ffca854a09dc592de6282b84bbbe4359fe30d70bc294e69e062705b6ea7755668e50bd806ac425", @generic="2c794725b38b4d13319a94086ea4f34d231676ed524d827625e7f6101a0413ee3e4860a39f5c5f9f2d4db21e5c0f1678119c000e3efb00d9aabd49f9cdfb193b2c37fbaa43d59de6269b74e02284f4fe023c58a9f0cd35f5201eff06b1ccd593cac08df2240aa3e3e68b26bd4bbbf18df938c09e4b227f7ce1c512f172a3e0d28225ab7eb1d29155e971d5313e7843cab6f28d0426eaa928ba618e56c8dde894c40992767b71518d074e8371e8dafaaa36a3"]}, @nested={0x18, 0x4c, [@typed={0x8, 0x81, @uid=r5}, @typed={0xc, 0x87, @u64=0x3}]}, @nested={0x1034, 0x9, [@generic="81c140b18735030fb24fdff49bb332501d3c05877f79fb594060a11561a271a8bd3d0bf69940c2aa1b51bf83c557", @generic="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"]}, @generic="4af64a91d3d62d12a553aaac131457e6a1e0915a423d68889ede12253903b6b7c5de8e41d6bc78d8c38ac4c344eb556fca6199b5bc2643c602f54aba240169b8531287366d37f8afdebfab13415878cedd9bcd83aa8e2c8213dda653722d68613652d0ff5da653b96107155a5ff29ab8ee59e54118531b3b39aa446a2fe0c99991d89d46186a3bff0af57e2c86", @typed={0xc, 0x3, @u64=0x2b3a}, @nested={0x9c, 0x75, [@generic="e4a47c5f94356b3036c3bb88395dc3948a1c9cdee5dfd5209611d2417c5dc0f1b1fbff2b782f566226d6a03e24c359b69c8585322e5d20b0aab22e7f839a9fbd6966822f3f39d4e70941d36975611ec43135d1baca18e973c8de8fb4b2dfca46b4f5738fb6f021d9709918ec7a6db12954bf7bf83641ef014ccdc6f4bff613a8a57c14c17c8b91d94b506ebcb5f6", @typed={0x8, 0x2d, @fd=r0}]}]}, 0x2614}, 0x1, 0x0, 0x0, 0x4}, 0x10) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:16:10 executing program 0 (fault-call:5 fault-nth:3): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x40000259, &(0x7f0000000100)=[r1, r1, r1, r1, r1]) 00:16:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x38, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554"}, &(0x7f00000005c0)=0x40) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 496.315470] device bridge_slave_1 left promiscuous mode [ 496.321299] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.367920] FAULT_INJECTION: forcing a failure. [ 496.367920] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 496.379768] CPU: 1 PID: 25841 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 496.386689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.396619] Call Trace: [ 496.399238] dump_stack+0x185/0x1d0 [ 496.402877] should_fail+0x87b/0xab0 [ 496.406601] __alloc_pages_nodemask+0x600/0x5cc0 [ 496.411362] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 496.416733] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 496.422185] ? get_page_from_freelist+0xacd1/0xb7b0 [ 496.427210] ? save_stack_trace+0xa5/0xf0 [ 496.431370] ? kmsan_alloc_meta_for_pages+0x166/0x3b0 [ 496.436566] ? kmsan_alloc_page+0x82/0xe0 [ 496.440802] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 496.445735] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 496.450936] kmsan_alloc_meta_for_pages+0x81/0x3b0 [ 496.455878] ? kmsan_set_origin_inline+0x6b/0x120 [ 496.460730] ? __msan_poison_alloca+0x15c/0x1d0 [ 496.465405] ? kmsan_set_origin_inline+0x6b/0x120 [ 496.470259] kmsan_alloc_page+0x82/0xe0 [ 496.474242] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 496.479001] ? __kernel_text_address+0x34/0xe0 [ 496.483589] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 496.489040] ? __save_stack_trace+0x90d/0xb00 [ 496.493545] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 496.498915] ? __module_address+0x6a/0x600 [ 496.503154] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 496.508518] ? __bitmap_intersects+0x173/0x300 [ 496.513113] alloc_pages_vma+0xcc6/0x17f0 [ 496.517267] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 496.522297] ? find_lock_entry+0xc8/0x720 [ 496.526455] ? find_get_entry+0x7ef/0x820 [ 496.530607] ? shmem_getpage_gfp+0x61f/0x59c0 [ 496.535106] ? shmem_getpage_gfp+0x61f/0x59c0 [ 496.539611] shmem_getpage_gfp+0x3991/0x59c0 [ 496.544028] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 496.548698] ? __wake_up_common_lock+0x10c/0x370 [ 496.553461] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 496.558920] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 496.564290] ? vmalloc_to_page+0x50b/0x630 00:16:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2000004, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 496.568538] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 496.573915] shmem_file_read_iter+0x508/0x1180 [ 496.578496] ? __fsnotify_parent+0x75/0x560 [ 496.582818] ? security_file_permission+0x390/0x480 [ 496.587843] ? kmsan_set_origin_inline+0x6b/0x120 [ 496.592700] ? shmem_file_llseek+0xd80/0xd80 [ 496.597112] generic_file_splice_read+0x5d7/0x900 [ 496.601971] ? splice_shrink_spd+0x100/0x100 [ 496.606389] splice_direct_to_actor+0x4cb/0x1040 [ 496.611145] ? do_splice_direct+0x540/0x540 [ 496.615483] do_splice_direct+0x335/0x540 [ 496.619639] ? security_file_permission+0x1f0/0x480 [ 496.624668] do_sendfile+0x107b/0x1e40 [ 496.628580] __x64_sys_sendfile64+0x218/0x390 [ 496.633082] ? __ia32_sys_sendfile+0x160/0x160 [ 496.637664] do_syscall_64+0x15b/0x230 [ 496.641555] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 496.646740] RIP: 0033:0x455ab9 [ 496.649925] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 496.657628] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 00:16:10 executing program 4: r0 = socket(0x11, 0x4000007, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x2006) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x5001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'6_vti0\x00\x00\x00*\x00', 0x1000000a201}) write$tun(r1, &(0x7f0000000480)={@void, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x211, 0x0, 0x0, 0x0, 0xffffff84, 0x0, @empty, @multicast1=0xe0000001}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000001, "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"}}}, 0x21b) [ 496.664895] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 496.672160] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 496.679427] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 496.686695] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000003 [ 496.694856] device bridge_slave_0 left promiscuous mode [ 496.700792] bridge0: port 1(bridge_slave_0) entered disabled state 00:16:10 executing program 0 (fault-call:5 fault-nth:4): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x4000000200000000, 0xa84d}) [ 496.811707] team0 (unregistering): Port device team_slave_1 removed [ 496.848988] team0 (unregistering): Port device team_slave_0 removed 00:16:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x6, &(0x7f0000000140)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) shutdown(r1, 0x1) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000440)=0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x26d822e0}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000280)={r3, 0x6, 0x0, 0x28}, 0x10) epoll_create(0x6) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={r3, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}}, &(0x7f0000000400)=0x84) [ 496.884299] bond0 (unregistering): Releasing backup interface bond_slave_1 00:16:10 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x1000000000000, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) recvmsg(r0, &(0x7f0000000740)={&(0x7f00000001c0)=@generic, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000240)=""/166, 0xa6}, {&(0x7f0000000300)=""/244, 0xa5}, {&(0x7f0000000400)=""/170, 0xaa}, {&(0x7f00000004c0)=""/117, 0x75}, {&(0x7f0000000540)=""/151, 0x97}, {&(0x7f0000000600)=""/173, 0xad}, {&(0x7f0000000780)=""/38, 0x26}], 0x7, &(0x7f0000000140)=""/54, 0x36, 0x8}, 0x60) shutdown(r0, 0x2) [ 496.945500] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 496.983643] FAULT_INJECTION: forcing a failure. [ 496.983643] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 496.995494] CPU: 1 PID: 25867 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 497.002459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.011808] Call Trace: [ 497.014404] dump_stack+0x185/0x1d0 [ 497.018040] should_fail+0x87b/0xab0 [ 497.021768] __alloc_pages_nodemask+0x600/0x5cc0 [ 497.026533] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 497.031906] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 497.037364] ? get_page_from_freelist+0xacd1/0xb7b0 [ 497.042559] ? save_stack_trace+0xa5/0xf0 [ 497.046718] ? kmsan_alloc_meta_for_pages+0x166/0x3b0 [ 497.051909] ? kmsan_alloc_page+0x82/0xe0 [ 497.056060] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 497.061009] kmsan_alloc_meta_for_pages+0x109/0x3b0 [ 497.062981] IPVS: ftp: loaded support on port[0] = 21 [ 497.066030] ? kmsan_set_origin_inline+0x6b/0x120 [ 497.066045] ? __msan_poison_alloca+0x15c/0x1d0 [ 497.066062] ? kmsan_set_origin_inline+0x6b/0x120 [ 497.066083] kmsan_alloc_page+0x82/0xe0 [ 497.066099] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 497.066114] ? __kernel_text_address+0x34/0xe0 [ 497.066129] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 497.066141] ? __save_stack_trace+0x90d/0xb00 [ 497.066161] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 497.066175] ? __module_address+0x6a/0x600 [ 497.066191] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 497.066200] ? __bitmap_intersects+0x173/0x300 [ 497.066223] alloc_pages_vma+0xcc6/0x17f0 [ 497.132551] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 497.137575] ? find_lock_entry+0xc8/0x720 [ 497.141729] ? find_get_entry+0x7ef/0x820 [ 497.145883] ? shmem_getpage_gfp+0x61f/0x59c0 [ 497.150395] ? shmem_getpage_gfp+0x61f/0x59c0 [ 497.154902] shmem_getpage_gfp+0x3991/0x59c0 [ 497.159321] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 497.164690] ? __list_add_valid+0xb8/0x450 [ 497.168936] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 497.174317] shmem_file_read_iter+0x508/0x1180 [ 497.178902] ? __fsnotify_parent+0x75/0x560 [ 497.183223] ? security_file_permission+0x390/0x480 [ 497.188242] ? kmsan_set_origin_inline+0x6b/0x120 00:16:11 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x3, 0x8, 0x83df, "da2991fb627967513f9f4095e9e54016da72868059e6699c37db989941bf6cc45d7078a2b6754228079b87c22d286fcb74d1fdaffd9bdf642aeb32185a748ad647ae1b39a66fe75a4a8ba645e64662af"}, 0xd8) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000000)=0x100000000, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x8000) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000240)) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000280)={0xfffffffffffffffe, 0x9, 0x80000001, 0xb6}) [ 497.193094] ? shmem_file_llseek+0xd80/0xd80 [ 497.197503] generic_file_splice_read+0x5d7/0x900 [ 497.202359] ? splice_shrink_spd+0x100/0x100 [ 497.206770] splice_direct_to_actor+0x4cb/0x1040 [ 497.211534] ? do_splice_direct+0x540/0x540 [ 497.215871] do_splice_direct+0x335/0x540 [ 497.220026] ? security_file_permission+0x1f0/0x480 [ 497.225053] do_sendfile+0x107b/0x1e40 [ 497.228979] __x64_sys_sendfile64+0x218/0x390 [ 497.233485] ? __ia32_sys_sendfile+0x160/0x160 [ 497.238067] do_syscall_64+0x15b/0x230 [ 497.241970] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 497.247154] RIP: 0033:0x455ab9 [ 497.250337] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 497.258047] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 497.265321] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 497.272593] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 497.279857] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 497.287125] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000004 00:16:11 executing program 0 (fault-call:5 fault-nth:5): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:11 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101000, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) [ 497.389729] bond0 (unregistering): Released all slaves [ 497.516322] FAULT_INJECTION: forcing a failure. [ 497.516322] name failslab, interval 1, probability 0, space 0, times 0 [ 497.527598] CPU: 1 PID: 25898 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 497.534543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.543918] Call Trace: [ 497.546555] dump_stack+0x185/0x1d0 [ 497.550227] should_fail+0x87b/0xab0 [ 497.554011] __should_failslab+0x278/0x2a0 [ 497.558306] should_failslab+0x29/0x70 [ 497.562248] kmem_cache_alloc+0x129/0xb70 00:16:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x38, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554"}, &(0x7f00000005c0)=0x40) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 497.566433] ? radix_tree_node_alloc+0x135/0x5c0 [ 497.571237] radix_tree_node_alloc+0x135/0x5c0 [ 497.575853] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 497.581285] __radix_tree_create+0x579/0xc00 [ 497.585775] __radix_tree_insert+0x17d/0x580 [ 497.590246] shmem_add_to_page_cache+0x59c/0xae0 [ 497.595054] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 497.600821] shmem_getpage_gfp+0x42ad/0x59c0 [ 497.605369] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 497.610085] ? __wake_up_common_lock+0x10c/0x370 [ 497.614895] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 497.620402] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 497.625810] ? vmalloc_to_page+0x50b/0x630 [ 497.630076] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 497.635486] shmem_file_read_iter+0x508/0x1180 [ 497.640084] ? __fsnotify_parent+0x75/0x560 [ 497.644429] ? security_file_permission+0x390/0x480 [ 497.649466] ? kmsan_set_origin_inline+0x6b/0x120 [ 497.654327] ? shmem_file_llseek+0xd80/0xd80 [ 497.658764] generic_file_splice_read+0x5d7/0x900 [ 497.663642] ? splice_shrink_spd+0x100/0x100 [ 497.668075] splice_direct_to_actor+0x4cb/0x1040 [ 497.672857] ? do_splice_direct+0x540/0x540 [ 497.677234] do_splice_direct+0x335/0x540 [ 497.681412] ? security_file_permission+0x1f0/0x480 [ 497.686463] do_sendfile+0x107b/0x1e40 [ 497.690401] __x64_sys_sendfile64+0x218/0x390 [ 497.694911] ? __ia32_sys_sendfile+0x160/0x160 [ 497.699497] do_syscall_64+0x15b/0x230 [ 497.703406] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 497.708595] RIP: 0033:0x455ab9 00:16:11 executing program 1: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1, 0x207ff) read(r0, &(0x7f0000000780)=""/192, 0xbd) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x10011, r0, 0x0) r1 = semget$private(0x0, 0x0, 0x80) semctl$IPC_RMID(r1, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) [ 497.711780] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 497.719503] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 497.726771] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 497.734043] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 497.741311] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 497.748581] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000005 [ 498.870060] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.876473] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.883823] device bridge_slave_0 entered promiscuous mode [ 498.923227] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.929619] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.936861] device bridge_slave_1 entered promiscuous mode [ 498.976622] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 499.016565] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 499.130298] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 499.174677] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 499.356198] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 499.363633] team0: Port device team_slave_0 added [ 499.402493] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 499.409692] team0: Port device team_slave_1 added [ 499.449488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 499.488860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 499.531460] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 499.538662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 499.547752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 499.584752] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 499.591947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 499.601111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 500.006950] bridge0: port 2(bridge_slave_1) entered blocking state [ 500.013369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 500.020131] bridge0: port 1(bridge_slave_0) entered blocking state [ 500.026505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 500.033978] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 500.575163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 501.539366] 8021q: adding VLAN 0 to HW filter on device bond0 [ 501.686348] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 501.834696] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 501.840948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 501.848367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 501.992315] 8021q: adding VLAN 0 to HW filter on device team0 [ 502.851998] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 502.863092] syz-executor7 cpuset=syz7 mems_allowed=0 [ 502.868277] CPU: 0 PID: 25874 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 502.875219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.884584] Call Trace: [ 502.887178] dump_stack+0x185/0x1d0 [ 502.890801] dump_header+0x2cc/0x16f0 [ 502.894603] ? __msan_poison_alloca+0x15c/0x1d0 [ 502.899272] ? oom_kill_process+0x2e0/0x2160 [ 502.903681] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 502.909135] ? ___ratelimit+0x67f/0x760 [ 502.913124] oom_kill_process+0x341/0x2160 [ 502.917357] ? mem_cgroup_scan_tasks+0x289/0x610 [ 502.922113] out_of_memory+0x1700/0x1da0 [ 502.926176] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 502.931535] ? _cond_resched+0x8b/0xd0 [ 502.935432] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 502.940628] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 502.946031] pagefault_out_of_memory+0x57/0x110 [ 502.950695] mm_fault_error+0x460/0x7c0 [ 502.954683] __do_page_fault+0x1274/0x1a10 [ 502.958921] do_page_fault+0xb7/0x250 [ 502.962718] ? page_fault+0x8/0x30 [ 502.966258] page_fault+0x1e/0x30 [ 502.969702] RIP: 0033:0x407198 [ 502.972879] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 502.978332] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 502.985602] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 502.992861] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 503.000120] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 503.007391] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 503.015261] Task in /syz7 killed as a result of limit of /syz7 [ 503.021335] memory: usage 1196kB, limit 0kB, failcnt 76 [ 503.026746] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 503.033547] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 503.039736] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 503.059580] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 503.068348] [25874] 0 25874 17553 8392 118784 0 0 syz-executor7 [ 503.077263] Memory cgroup out of memory: Kill process 25874 (syz-executor7) score 8421000 or sacrifice child [ 503.087307] Killed process 25874 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB 00:16:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x54, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c573"}, &(0x7f00000005c0)=0x5c) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:17 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x400000, 0x0) fchdir(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) unshare(0x2000400) r2 = open(&(0x7f000000cff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r1, 0x400, 0x8000000000000) fcntl$setlease(r2, 0x400, 0x2) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) 00:16:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x375, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x24020400) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000380)="6e6d8f3b2778bc732f75") r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000001400)={'sit0\x00', &(0x7f00000013c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000bc78"]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f000074fffc), 0x348) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x200, 0x4) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x5) ioctl$int_in(r2, 0x0, &(0x7f00000000c0)) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000001c0)=""/205) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x20004000, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, &(0x7f0000000100), 0x8000fffffffe) 00:16:17 executing program 0 (fault-call:5 fault-nth:6): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r2, 0x8}}, 0x10) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x80081, 0x0) socket$inet(0x2b, 0xfffffffffffffffd, 0x4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x1, 0x4) 00:16:17 executing program 6: socketpair$unix(0x1, 0x409, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x528, 0x400200) recvmsg$kcm(r3, &(0x7f0000001800)={&(0x7f00000003c0)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000440)=""/218, 0xda}, {&(0x7f0000000540)=""/32, 0x20}, {&(0x7f0000000580)=""/41, 0x29}, {&(0x7f00000005c0)=""/125, 0x7d}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/32, 0x20}], 0x6, &(0x7f0000001700)=""/208, 0xd0, 0x6}, 0x0) syz_open_dev$tun(&(0x7f0000001940)='/dev/net/tun\x00', 0x0, 0x4000) r4 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x200, 0xc0) r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x9, 0x20000) ppoll(&(0x7f00000002c0)=[{r0, 0x4128}, {r5, 0x4000}, {r4, 0x4000}, {r0, 0x8008}, {r5, 0x200}], 0x5, &(0x7f0000000300), &(0x7f0000000340)={0x3}, 0x8) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f00000018c0)={0x9, &(0x7f0000001840)=[{0x8a4, 0x8000, 0x6}, {0x8, 0xffffff8000000000, 0x80000001, 0x2}, {0x7, 0x7f, 0x7ff, 0x7}, {0x3, 0xbb, 0x7, 0x888}, {0x401, 0x6, 0x1ff, 0xffffffff}, {0xc8e, 0x8d, 0x4, 0x9}, {0x1, 0x1, 0x3, 0xfffffffffffffffd}, {0x3, 0x8, 0x8, 0x4}, {0x300000000000000, 0x5, 0x7ff, 0x3}]}, 0x10) renameat2(r4, &(0x7f0000000200)='./file0\x00', r5, &(0x7f0000000280)='./file0\x00', 0x2) r6 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x80000) tee(r3, r6, 0xfffffffe, 0x4) write$cgroup_type(r6, &(0x7f0000000140)='threaded\x00', 0x9) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r6, 0x1) ioctl$PIO_FONTRESET(r6, 0x4b6d, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) 00:16:17 executing program 2: nanosleep(&(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000140)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000001c0)={{0x3f, 0x5}, 'port0\x00', 0x80, 0x40, 0x6aa4, 0xd5, 0x48a, 0x8, 0x1, 0x0, 0x4, 0x5d9}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000500)=0x5, 0x4) ppoll(&(0x7f0000000100)=[{r3}, {r2}], 0x2, &(0x7f0000000080)={r4}, &(0x7f00000000c0), 0x8) shutdown(r2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000580)={0x0, 0x4, 0x9, 0x6}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000600)={r5, 0xc6, "ee515043508cac99f1e6b00d130e7b2ed9ddd756d58e7d3a249510a99a947083eeffbcafbe7dc681bff26ceb8ca055e644e505c760083640db75709e959cfcff0d975a12257b95731c37130fe7feb2976bc70cb41d957cdf20a923cf17c7912be02924a1817671db062528f18a45a73f1bb8fac6fee3538ac6f8ef9ae9d9a2dc6a7431a27ff31c037d958f3686bd044c6458d0cd2c6f0854fdb24e5d99e6ea923a275c38d5bfe248952b8766a79981385323a5c41d707de1bd6235ff59b61f1b6604da5a640f"}, &(0x7f0000000700)=0xce) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@multicast2=0xe0000002, 0x4e24, 0x7ea, 0x4e20, 0x7, 0xa, 0x20, 0x0, 0x0, 0x0, r6}, {0x7, 0x20, 0x1, 0x0, 0x9, 0x5, 0x1f, 0x2}, {0x7, 0x2, 0x5, 0x8}, 0x1, 0x6e6bb2, 0x0, 0x1, 0x2, 0x2}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x3c}, 0x2, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x1, 0x2, 0x1f, 0xff, 0x6, 0x1f}}, 0xe8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0xea, "abb49ca0157a37a30f20db4d0fcdab75963f8edbcc6372e4818b21c7ee1d9c7b51825cc1d83b15af1657ae647ddd3e1d57b795a937f5e9b21906221498a5c0ce034363d39ee0d9212c9f758a3c6ff5b423ce1655a1127aac0aa27aa54c5e6ac7cf1a9d230dd59b55906c7e64daa10bf728318e18e2f14b01a26e21d33dce70ed9457f9ad82343934ce1727c39e833250920efee650f765302c92c6776cebeb22bae6108ff6a064716cf67a3ff3adc8b5f016ed2abd48a91bbecc45c9a9e6936b7acb25572cb03838e3c22b9d6e8e0bb54c610de8eba068f73205cd0d078802ecb429f50a612ffa882fc7"}, &(0x7f0000000380)=0xf2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={r7, @in6={{0xa, 0x4e22, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xffff}}, [0x7, 0x80, 0x800, 0x5, 0x0, 0x7, 0x6, 0xffff, 0x5, 0x9, 0x3, 0x5, 0x7eb2, 0x6, 0x7]}, &(0x7f0000000540)=0x100) 00:16:17 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14}, @local={0xac, 0x223, 0x14, 0xaa}}, @igmp={0x0, 0x0, 0x0, @multicast2=0xe0000002}}}}}, &(0x7f0000000080)) [ 503.269502] FAULT_INJECTION: forcing a failure. [ 503.269502] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 503.281593] CPU: 0 PID: 26184 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 503.288547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.297924] Call Trace: [ 503.300567] dump_stack+0x185/0x1d0 [ 503.304243] should_fail+0x87b/0xab0 [ 503.308024] __alloc_pages_nodemask+0x600/0x5cc0 [ 503.312822] ? kmsan_set_origin_inline+0x6b/0x120 [ 503.317717] ? __msan_poison_alloca+0x15c/0x1d0 [ 503.322422] ? kmem_cache_alloc+0x6c7/0xb70 [ 503.326790] ? memcg_kmem_put_cache+0x40/0x290 [ 503.331404] ? kmem_cache_alloc+0x6c7/0xb70 [ 503.335779] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 503.341197] ? kmem_cache_alloc+0xa97/0xb70 [ 503.345562] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 503.350954] ? __bitmap_intersects+0x173/0x300 [ 503.355594] alloc_pages_vma+0xcc6/0x17f0 [ 503.359809] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 503.364884] ? find_lock_entry+0xc8/0x720 [ 503.369090] ? find_get_entry+0x7ef/0x820 [ 503.373294] ? shmem_getpage_gfp+0x61f/0x59c0 [ 503.377841] ? shmem_getpage_gfp+0x61f/0x59c0 [ 503.382402] shmem_getpage_gfp+0x3991/0x59c0 [ 503.386870] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 503.391587] ? __wake_up_common_lock+0x10c/0x370 [ 503.396398] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 503.401905] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 503.407329] ? vmalloc_to_page+0x50b/0x630 [ 503.411643] ? _cond_resched+0x3c/0xd0 [ 503.415603] shmem_file_read_iter+0x508/0x1180 00:16:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) [ 503.420250] ? shmem_file_llseek+0xd80/0xd80 [ 503.424716] generic_file_splice_read+0x5d7/0x900 [ 503.429630] ? splice_shrink_spd+0x100/0x100 [ 503.434092] splice_direct_to_actor+0x4cb/0x1040 [ 503.438899] ? do_splice_direct+0x540/0x540 [ 503.443298] do_splice_direct+0x335/0x540 [ 503.447511] ? security_file_permission+0x1f0/0x480 [ 503.452574] do_sendfile+0x107b/0x1e40 [ 503.456554] __x64_sys_sendfile64+0x218/0x390 [ 503.461097] ? __ia32_sys_sendfile+0x160/0x160 [ 503.465710] do_syscall_64+0x15b/0x230 [ 503.469642] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 503.474853] RIP: 0033:0x455ab9 [ 503.478057] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 503.485800] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 503.493083] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 503.500363] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 503.507653] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 503.514942] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000006 00:16:17 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x46, &(0x7f0000000700)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x10, 0x11, 0x0, @dev={0xfe, 0x80}, @local={0xfe, 0x80, [], 0xaa}, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, &(0x7f0000001780)) 00:16:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x2000, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) sysinfo(&(0x7f0000000040)=""/4096) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000001040)={0x1, 0xfff, 0x80000000, 0x7, 0xfffffffffffffffa, 0x6}) 00:16:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x62, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9"}, &(0x7f00000005c0)=0x6a) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 503.709265] device bridge_slave_1 left promiscuous mode [ 503.715198] bridge0: port 2(bridge_slave_1) entered disabled state 00:16:17 executing program 0 (fault-call:5 fault-nth:7): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 503.773716] device bridge_slave_0 left promiscuous mode [ 503.779526] bridge0: port 1(bridge_slave_0) entered disabled state 00:16:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000003c40)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000003d40)='./file0\x00', 0x0, 0x0) dup3(r1, r0, 0x0) futimesat(r0, &(0x7f0000000080)='.\x00', &(0x7f0000000100)={{}, {0x0, 0x2710}}) 00:16:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e6bb51d7ff596e1c92de0eaa319198e91f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7") sendfile(r0, r0, &(0x7f00000002c0)=0x202, 0xd9) [ 503.956436] FAULT_INJECTION: forcing a failure. [ 503.956436] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 503.968279] CPU: 1 PID: 26218 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 503.975203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.984554] Call Trace: [ 503.987147] dump_stack+0x185/0x1d0 [ 503.990782] should_fail+0x87b/0xab0 [ 503.994502] __alloc_pages_nodemask+0x600/0x5cc0 [ 503.999265] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 504.004635] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 504.010088] ? get_page_from_freelist+0xacd1/0xb7b0 [ 504.015111] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 504.015377] IPVS: ftp: loaded support on port[0] = 21 [ 504.020553] ? __save_stack_trace+0x90d/0xb00 [ 504.020583] kmsan_alloc_meta_for_pages+0x81/0x3b0 [ 504.020597] ? alloc_pages_vma+0xcc6/0x17f0 [ 504.020610] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 504.020623] ? shmem_getpage_gfp+0x3991/0x59c0 [ 504.020638] ? splice_direct_to_actor+0x4cb/0x1040 [ 504.020652] ? do_sendfile+0x107b/0x1e40 [ 504.020675] ? __x64_sys_sendfile64+0x218/0x390 [ 504.062910] ? do_syscall_64+0x15b/0x230 [ 504.066978] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 504.072339] ? __msan_poison_alloca+0x15c/0x1d0 [ 504.077017] ? kmsan_set_origin_inline+0x6b/0x120 [ 504.081863] kmsan_alloc_page+0x82/0xe0 [ 504.085837] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 504.090592] ? kmsan_set_origin_inline+0x6b/0x120 [ 504.095433] ? __msan_poison_alloca+0x15c/0x1d0 [ 504.100100] ? kmem_cache_alloc+0x6c7/0xb70 00:16:18 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x80000000, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 00:16:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x100, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 504.104421] ? memcg_kmem_put_cache+0x40/0x290 [ 504.109003] ? kmem_cache_alloc+0x6c7/0xb70 [ 504.113323] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 504.118689] ? kmem_cache_alloc+0xa97/0xb70 [ 504.123016] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 504.128382] ? __bitmap_intersects+0x173/0x300 [ 504.132977] alloc_pages_vma+0xcc6/0x17f0 [ 504.137136] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 504.142159] ? find_lock_entry+0xc8/0x720 [ 504.146323] ? find_get_entry+0x7ef/0x820 [ 504.150473] ? shmem_getpage_gfp+0x61f/0x59c0 [ 504.154974] ? shmem_getpage_gfp+0x61f/0x59c0 [ 504.159474] shmem_getpage_gfp+0x3991/0x59c0 [ 504.163883] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 504.168553] ? __wake_up_common_lock+0x10c/0x370 [ 504.173319] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 504.178773] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 504.184142] ? vmalloc_to_page+0x50b/0x630 [ 504.188387] ? _cond_resched+0x3c/0xd0 [ 504.192284] shmem_file_read_iter+0x508/0x1180 [ 504.196892] ? shmem_file_llseek+0xd80/0xd80 [ 504.201327] generic_file_splice_read+0x5d7/0x900 00:16:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x2, 0x16, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@rand_addr}}]}, 0x50}, 0x1}, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000040)='bpq0\x00') [ 504.206179] ? splice_shrink_spd+0x100/0x100 [ 504.210590] splice_direct_to_actor+0x4cb/0x1040 [ 504.215349] ? do_splice_direct+0x540/0x540 [ 504.219700] do_splice_direct+0x335/0x540 [ 504.219719] ? security_file_permission+0x1f0/0x480 [ 504.219739] do_sendfile+0x107b/0x1e40 [ 504.219767] __x64_sys_sendfile64+0x218/0x390 [ 504.219787] ? __ia32_sys_sendfile+0x160/0x160 [ 504.219798] do_syscall_64+0x15b/0x230 00:16:18 executing program 0 (fault-call:5 fault-nth:8): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 504.219815] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 504.219826] RIP: 0033:0x455ab9 [ 504.219832] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 504.219844] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 504.219850] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 504.219857] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 00:16:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000000)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) [ 504.219863] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 504.219870] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000007 [ 504.232090] team0 (unregistering): Port device team_slave_1 removed [ 504.244347] team0 (unregistering): Port device team_slave_0 removed [ 504.300702] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 504.320485] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 504.416733] bond0 (unregistering): Released all slaves [ 504.435935] FAULT_INJECTION: forcing a failure. [ 504.435935] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 504.499481] CPU: 1 PID: 26248 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 504.499488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.499492] Call Trace: [ 504.499513] dump_stack+0x185/0x1d0 [ 504.499531] should_fail+0x87b/0xab0 [ 504.499561] __alloc_pages_nodemask+0x600/0x5cc0 [ 504.530477] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 504.535846] ? __msan_metadata_ptr_for_store_8+0x13/0x20 00:16:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x6, 0x20e, 0x7f, 0xab7, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000100)={r2, 0xb6, "fc11e5a711efb4f854da7075910c131cb33e784f493a0461594eb0c90d190e1062b5fbb8c4870af98e49658da13894fdb773d593a20c2fccf31ac1fc5b8cd732f601ae4492c997a5440d75c7f3cd1bf3f9fab5f490f3b7bf4003fc0649075a6a4ffe81472af3384e4cd1433b425c230012f9314dbbf095ce326ac65a713ee3ebb5316b30546a1d74973ab2e5a57cc248919625aa0876fbc8efa714738db58ccce0671185280ccc7a496bc7382d717317c9da70fb94ab"}, &(0x7f00000001c0)=0xbe) [ 504.541300] ? get_page_from_freelist+0xacd1/0xb7b0 [ 504.546320] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 504.551764] ? __save_stack_trace+0x90d/0xb00 [ 504.556278] kmsan_alloc_meta_for_pages+0x109/0x3b0 [ 504.561295] ? alloc_pages_vma+0xcc6/0x17f0 [ 504.565613] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 504.570802] ? shmem_getpage_gfp+0x3991/0x59c0 [ 504.575475] ? splice_direct_to_actor+0x4cb/0x1040 [ 504.580406] ? do_sendfile+0x107b/0x1e40 [ 504.584476] ? __x64_sys_sendfile64+0x218/0x390 [ 504.589146] ? do_syscall_64+0x15b/0x230 [ 504.593212] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 504.598578] ? kmsan_set_origin_inline+0x6b/0x120 [ 504.603428] ? kmsan_set_origin_inline+0x6b/0x120 [ 504.608278] kmsan_alloc_page+0x82/0xe0 [ 504.612256] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 504.617015] ? kmsan_set_origin_inline+0x6b/0x120 [ 504.621860] ? __msan_poison_alloca+0x15c/0x1d0 [ 504.626535] ? kmem_cache_alloc+0x6c7/0xb70 [ 504.630868] ? memcg_kmem_put_cache+0x40/0x290 [ 504.635455] ? kmem_cache_alloc+0x6c7/0xb70 [ 504.639781] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 504.645141] ? kmem_cache_alloc+0xa97/0xb70 [ 504.649464] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 504.654826] ? __bitmap_intersects+0x173/0x300 [ 504.659418] alloc_pages_vma+0xcc6/0x17f0 [ 504.663578] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 504.668595] ? find_lock_entry+0xc8/0x720 [ 504.672744] ? find_get_entry+0x7ef/0x820 [ 504.676893] ? shmem_getpage_gfp+0x61f/0x59c0 [ 504.681383] ? shmem_getpage_gfp+0x61f/0x59c0 [ 504.685881] shmem_getpage_gfp+0x3991/0x59c0 [ 504.690289] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 504.694956] ? __wake_up_common_lock+0x10c/0x370 [ 504.699716] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 504.705168] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 504.710532] ? vmalloc_to_page+0x50b/0x630 [ 504.714780] ? _cond_resched+0x3c/0xd0 [ 504.718679] shmem_file_read_iter+0x508/0x1180 [ 504.723270] ? shmem_file_llseek+0xd80/0xd80 [ 504.727678] generic_file_splice_read+0x5d7/0x900 [ 504.732558] ? splice_shrink_spd+0x100/0x100 [ 504.736974] splice_direct_to_actor+0x4cb/0x1040 [ 504.741732] ? do_splice_direct+0x540/0x540 [ 504.746064] do_splice_direct+0x335/0x540 [ 504.750203] ? security_file_permission+0x1f0/0x480 [ 504.755201] do_sendfile+0x107b/0x1e40 [ 504.759094] __x64_sys_sendfile64+0x218/0x390 [ 504.763592] ? __ia32_sys_sendfile+0x160/0x160 [ 504.768167] do_syscall_64+0x15b/0x230 [ 504.772049] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 504.777220] RIP: 0033:0x455ab9 [ 504.780403] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 504.788101] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 504.795364] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 504.802619] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 504.809873] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 504.817135] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000008 00:16:18 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80002, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:16:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x80000008, 0x0) r1 = creat(&(0x7f0000000600)='./file0\x00', 0x6) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000000c0)={0x7, 0x0, 0x20a, 0xea, 0x5, 0x2, 0x885f, 0x7, 0x0}, &(0x7f0000000100)=0x20) execveat(r1, &(0x7f0000000140)='./file1\x00', &(0x7f0000000400)=[&(0x7f0000000180)='\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='bdev+&ppp0wlan0x]$\'systemvboxnet0GPL@,)\x00', &(0x7f0000000280)='/dev/ptmx\x00', &(0x7f00000002c0)='/dev/ptmx\x00', &(0x7f0000000300)='{ppp0user\'\x00', &(0x7f0000000340)='/dev/ptmx\x00', &(0x7f0000000380)='/dev/ptmx\x00', &(0x7f00000003c0)='user\x00'], &(0x7f0000000580)=[&(0x7f0000000480)='eth1^em0-@nodevtrusted\x00', &(0x7f00000004c0)='mime_type!/\x00', &(0x7f0000000500)=':loGPL\x00', &(0x7f0000000540)='securityposix_acl_access-^\x00'], 0x1000) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYBLOB="004283fe0100000073bb31d0ed9164b2e5e32134b6907fc679d0944baa530b7eb8e711c00f"], 0xc) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TIOCCONS(r0, 0x541d) [ 506.019839] bridge0: port 1(bridge_slave_0) entered blocking state [ 506.026223] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.033724] device bridge_slave_0 entered promiscuous mode [ 506.074995] bridge0: port 2(bridge_slave_1) entered blocking state [ 506.081639] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.089098] device bridge_slave_1 entered promiscuous mode [ 506.129794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 506.170282] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 506.285687] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 506.328369] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 506.514179] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 506.521660] team0: Port device team_slave_0 added [ 506.560910] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 506.568242] team0: Port device team_slave_1 added [ 506.609083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 506.651502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 506.693784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 506.736910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 507.146168] bridge0: port 2(bridge_slave_1) entered blocking state [ 507.152563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 507.159289] bridge0: port 1(bridge_slave_0) entered blocking state [ 507.165664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 507.173303] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 507.937762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 508.664710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 508.803752] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 508.947981] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 508.954253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 508.962157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 509.100374] 8021q: adding VLAN 0 to HW filter on device team0 [ 509.950196] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 509.961201] syz-executor7 cpuset=syz7 mems_allowed=0 [ 509.966400] CPU: 0 PID: 26223 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 509.973361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.982706] Call Trace: [ 509.985298] dump_stack+0x185/0x1d0 [ 509.988925] dump_header+0x2cc/0x16f0 [ 509.992721] ? __msan_poison_alloca+0x15c/0x1d0 [ 509.997406] ? oom_kill_process+0x2e0/0x2160 [ 510.001821] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 510.007281] ? ___ratelimit+0x67f/0x760 [ 510.011279] oom_kill_process+0x341/0x2160 [ 510.015516] ? mem_cgroup_scan_tasks+0x289/0x610 [ 510.020277] out_of_memory+0x1700/0x1da0 [ 510.024358] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 510.029729] ? _cond_resched+0x8b/0xd0 [ 510.033636] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 510.038822] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 510.044202] pagefault_out_of_memory+0x57/0x110 [ 510.048876] mm_fault_error+0x460/0x7c0 [ 510.052885] __do_page_fault+0x1274/0x1a10 [ 510.057138] do_page_fault+0xb7/0x250 [ 510.060934] ? page_fault+0x8/0x30 [ 510.064488] page_fault+0x1e/0x30 [ 510.067929] RIP: 0033:0x407198 [ 510.071109] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 510.076467] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 510.083727] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 510.090996] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 510.098270] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 510.105530] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 510.112990] Task in /syz7 killed as a result of limit of /syz7 [ 510.119305] memory: usage 1196kB, limit 0kB, failcnt 84 [ 510.124725] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 510.131524] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 510.137710] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 510.157528] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 510.166311] [26223] 0 26223 17553 8392 114688 0 0 syz-executor7 [ 510.175216] Memory cgroup out of memory: Kill process 26223 (syz-executor7) score 8420000 or sacrifice child [ 510.185302] Killed process 26223 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB 00:16:24 executing program 7: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000540)) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xbbfb4dd14b76a286) sendmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001680)}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000440)={@in={{0x2, 0x4e22, @loopback=0x7f000001}}, 0x1, 0x6, 0xb849, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000600)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x375, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x24020400) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid_for_children/]\x00') perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r3, &(0x7f00000000c0)=""/186, 0xba) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1000082) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) 00:16:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x6000, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x44) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:16:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000040), 0x4) 00:16:24 executing program 0 (fault-call:5 fault-nth:9): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x62, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9"}, &(0x7f00000005c0)=0x6a) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)) ppoll(&(0x7f0000000100)=[{r1}, {r0, 0x8}], 0x2, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) shutdown(r0, 0xfffffffffffffffe) 00:16:24 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@ipv4={[], [0xff, 0xff], @rand_addr}, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev={0xfe, 0x80}, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4, 0x0, 0x80000000000020}}, 0xe8) connect$inet6(r0, &(0x7f00000002c0)={0xa}, 0x1c) 00:16:24 executing program 6: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000001c0)=""/122) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r2}, {r1}], 0x297, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r1, 0x2) [ 510.368752] FAULT_INJECTION: forcing a failure. [ 510.368752] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 510.380797] CPU: 0 PID: 26542 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 510.387748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.397132] Call Trace: [ 510.399770] dump_stack+0x185/0x1d0 [ 510.403436] should_fail+0x87b/0xab0 [ 510.407221] __alloc_pages_nodemask+0x600/0x5cc0 [ 510.412021] ? kmsan_set_origin_inline+0x6b/0x120 [ 510.416918] ? __msan_poison_alloca+0x15c/0x1d0 [ 510.421623] ? kmem_cache_alloc+0x6c7/0xb70 [ 510.425980] ? memcg_kmem_put_cache+0x40/0x290 [ 510.430594] ? kmem_cache_alloc+0x6c7/0xb70 [ 510.434963] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 510.440382] ? kmem_cache_alloc+0xa97/0xb70 [ 510.444748] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 510.450170] ? __bitmap_intersects+0x173/0x300 [ 510.454795] alloc_pages_vma+0xcc6/0x17f0 [ 510.459016] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 510.464095] ? find_lock_entry+0xc8/0x720 [ 510.468303] ? find_get_entry+0x7ef/0x820 [ 510.472506] ? shmem_getpage_gfp+0x61f/0x59c0 [ 510.477054] ? shmem_getpage_gfp+0x61f/0x59c0 [ 510.481619] shmem_getpage_gfp+0x3991/0x59c0 [ 510.486088] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 510.490805] ? __wake_up_common_lock+0x10c/0x370 [ 510.495613] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 510.501115] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 510.506538] ? vmalloc_to_page+0x50b/0x630 [ 510.510849] ? _cond_resched+0x3c/0xd0 [ 510.514804] shmem_file_read_iter+0x508/0x1180 [ 510.519447] ? shmem_file_llseek+0xd80/0xd80 [ 510.523914] generic_file_splice_read+0x5d7/0x900 [ 510.528823] ? splice_shrink_spd+0x100/0x100 [ 510.533282] splice_direct_to_actor+0x4cb/0x1040 [ 510.538089] ? do_splice_direct+0x540/0x540 [ 510.542486] do_splice_direct+0x335/0x540 [ 510.546691] ? security_file_permission+0x1f0/0x480 [ 510.551749] do_sendfile+0x107b/0x1e40 [ 510.555721] __x64_sys_sendfile64+0x218/0x390 [ 510.560259] ? __ia32_sys_sendfile+0x160/0x160 [ 510.565374] do_syscall_64+0x15b/0x230 [ 510.569296] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 510.574503] RIP: 0033:0x455ab9 [ 510.577705] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 510.585441] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 510.592733] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 510.600023] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 510.607308] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 510.613935] IPVS: ftp: loaded support on port[0] = 21 00:16:24 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x48040, 0x144) 00:16:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x3ffe, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 510.614589] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000009 00:16:24 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000280), 0x0, &(0x7f00000000c0)=""/216, 0xd8}}], 0x1, 0x0, &(0x7f0000000240)) r2 = dup3(r0, r1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f00000018c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x2) 00:16:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x69, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24e"}, &(0x7f00000005c0)=0x71) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:24 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x7, &(0x7f0000000040)={0x0}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:16:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:16:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000140)="295ee1311f16f477671070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 510.802797] device bridge_slave_1 left promiscuous mode [ 510.808502] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.883159] device bridge_slave_0 left promiscuous mode [ 510.888942] bridge0: port 1(bridge_slave_0) entered disabled state 00:16:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 511.009567] team0 (unregistering): Port device team_slave_1 removed [ 511.038269] team0 (unregistering): Port device team_slave_0 removed [ 511.057548] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 511.092202] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 511.121739] bond0 (unregistering): Released all slaves [ 512.149969] bridge0: port 1(bridge_slave_0) entered blocking state [ 512.156384] bridge0: port 1(bridge_slave_0) entered disabled state [ 512.163731] device bridge_slave_0 entered promiscuous mode [ 512.204306] bridge0: port 2(bridge_slave_1) entered blocking state [ 512.210686] bridge0: port 2(bridge_slave_1) entered disabled state [ 512.217972] device bridge_slave_1 entered promiscuous mode [ 512.258756] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 512.300576] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 512.418832] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 512.462921] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 512.650191] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 512.657671] team0: Port device team_slave_0 added [ 512.698336] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 512.705538] team0: Port device team_slave_1 added [ 512.745941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 512.788975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 512.830472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 512.837706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 512.846734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 512.881828] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 512.889089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 512.897547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 513.296521] bridge0: port 2(bridge_slave_1) entered blocking state [ 513.302928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 513.309661] bridge0: port 1(bridge_slave_0) entered blocking state [ 513.316099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 513.323719] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 514.271613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 514.811741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 514.955510] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 515.096815] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 515.103114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 515.110770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 515.247116] 8021q: adding VLAN 0 to HW filter on device team0 [ 516.071101] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 516.082155] syz-executor7 cpuset=syz7 mems_allowed=0 [ 516.087396] CPU: 0 PID: 26556 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 516.094471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.103816] Call Trace: [ 516.106405] dump_stack+0x185/0x1d0 [ 516.110038] dump_header+0x2cc/0x16f0 [ 516.113834] ? __msan_poison_alloca+0x15c/0x1d0 [ 516.118507] ? oom_kill_process+0x2e0/0x2160 [ 516.122922] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 516.128385] ? ___ratelimit+0x67f/0x760 [ 516.132370] oom_kill_process+0x341/0x2160 [ 516.136620] ? mem_cgroup_scan_tasks+0x289/0x610 [ 516.141389] out_of_memory+0x1700/0x1da0 [ 516.145454] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 516.150818] ? _cond_resched+0x8b/0xd0 [ 516.154714] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 516.159895] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 516.165268] pagefault_out_of_memory+0x57/0x110 [ 516.169932] mm_fault_error+0x460/0x7c0 [ 516.173922] __do_page_fault+0x1274/0x1a10 [ 516.178158] do_page_fault+0xb7/0x250 [ 516.181964] ? page_fault+0x8/0x30 [ 516.185500] page_fault+0x1e/0x30 [ 516.188940] RIP: 0033:0x407198 [ 516.192118] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 516.197487] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 516.204759] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 516.212112] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 516.219370] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 516.226639] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 516.234109] Task in /syz7 killed as a result of limit of /syz7 [ 516.240170] memory: usage 1196kB, limit 0kB, failcnt 92 [ 516.245599] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 516.252439] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 516.258635] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 516.278472] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 516.287343] [26556] 0 26556 17553 8392 114688 0 0 syz-executor7 [ 516.296230] Memory cgroup out of memory: Kill process 26556 (syz-executor7) score 8420000 or sacrifice child [ 516.306294] Killed process 26556 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB [ 516.337365] oom_reaper: reaped process 26556 (syz-executor7), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB 00:16:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x4000008912, &(0x7f00000001c0)="295ee1311f16f477671070") r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000220007031dfffd946f61830002200a00090000e7fe1c40000c1ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ebea8653b1cc7e63975c02007b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 00:16:30 executing program 5: flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/245, 0xf5) bpf$MAP_CREATE(0xf, &(0x7f0000000040), 0x2c) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x3, 0x800) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000080)) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000200)=""/205) 00:16:30 executing program 0 (fault-call:5 fault-nth:10): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:30 executing program 7: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000006800)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13}]}, 0x28}, 0x1}, 0x0) 00:16:30 executing program 4: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000305000/0x2000)=nil, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 00:16:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x6d, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c3"}, &(0x7f00000005c0)=0x75) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:30 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000000)=0x78) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000009c0)) socketpair$unix(0x1, 0x2000000000000, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@nat={'nat\x00', 0x1b, 0x5, 0x630, 0x328, 0x598, 0xffffffff, 0x3f8, 0x328, 0x598, 0x598, 0xffffffff, 0x598, 0x598, 0x5, &(0x7f0000000240), {[{{@ip={@empty, @multicast1=0xe0000001, 0xff, 0xffffff00, 'bridge_slave_1\x00', 'team_slave_1\x00', {}, {}, 0xed, 0x2, 0x4}, 0x0, 0x2f0, 0x328, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x2, 0xd22a}}, @common=@unspec=@bpf0={0x230, 'bpf\x00', 0x0, {0x3b, [{0x7, 0x6, 0x3ff, 0xec98}, {0x3, 0x200, 0x6, 0x1588}, {0x21918720, 0x800, 0x1f, 0x1000}, {0x1, 0x1f, 0x8000, 0xcbd}, {0xe8, 0x8b, 0x0, 0x8}, {0xffffffff, 0x8517, 0x4, 0x7}, {0x3a0, 0x0, 0x38000000, 0x5}, {0x0, 0x4, 0x0, 0x7f}, {0x6f11151b, 0x4, 0x80, 0xfffffffffffffffe}, {0x8, 0x7f, 0x81, 0x7}, {0x1f, 0x0, 0x677, 0x3}, {0x4800000000000000, 0x512, 0x6, 0xff}, {0x9, 0x7f46, 0x7, 0x1}, {0x8, 0x7, 0x100000001, 0x9}, {0x4c7, 0x3, 0x8001, 0x8028}, {0x0, 0xff, 0x3, 0x1f}, {0x3ff, 0x100000001, 0x8, 0x2}, {0x4, 0x6, 0x1, 0x4}, {0x0, 0x7, 0x8001}, {0x4, 0x49acb653, 0xfff, 0x10001}, {0x800, 0x80000000, 0x400, 0x20}, {0xfffffffffffffff7, 0x7f, 0x9, 0x2d0}, {0x3, 0x9, 0x3, 0x555}, {0x9, 0x100, 0x1, 0x6}, {0x1, 0x660, 0x7ff, 0x7ff}, {0x1, 0x800, 0x8, 0xfffffffffffffffe}, {0xfffffffffffffff9, 0x4, 0x10001, 0x6}, {0x800, 0x200, 0x8, 0xaaf1}, {0x32065244, 0x4, 0x5, 0xdeb}, {0x1000, 0x5, 0x8, 0x9}, {0xc60, 0x1800000, 0x100000000, 0x3}, {0x3, 0x2, 0x5, 0x3}, {0xfffffffffffffffa, 0x7, 0x7, 0x1000}, {0x1, 0x5, 0x815, 0x5}, {0x7, 0x40, 0x6, 0x3}, {0x0, 0x7f, 0x7fffffff, 0xfff}, {0xffffffff, 0x2, 0x8001, 0x1}, {0x0, 0x6, 0xc3e3, 0x9}, {0x81, 0x3, 0x0, 0x10001}, {0x5d, 0x4e1894d1, 0x3f, 0xd407}, {0x1, 0x800, 0x80000001, 0x3f}, {0x8b2, 0x40, 0x4c, 0x901f}, {0x600, 0x2, 0x400000000, 0x1}, {0x7, 0x3f, 0xffffffff, 0x7}, {0xe96, 0x2b, 0x400, 0x8001}, {0x2, 0x1, 0x77a3, 0xe9}, {0x54, 0x9, 0xa6, 0x1}, {0x0, 0x3, 0x401, 0x7ff}, {0xe4, 0x8, 0x0, 0x3}, {0xfff, 0x6, 0x8675, 0x1}, {0x101, 0xffffffffffffffff, 0x7, 0x3}, {0x6, 0x9, 0x80, 0x8}, {0x2, 0xffffffffffffff02, 0x54e, 0xd9}, {0x1, 0x39, 0x3, 0x288}, {0x533, 0x18, 0xfff, 0x86}, {0x493, 0x6, 0x5, 0x4}, {0x4, 0x2, 0x4, 0xffffffff}, {0x81, 0x9, 0x0, 0x2}, {0x64146051, 0x1, 0x8, 0x2}, {0x9, 0x8, 0x6, 0x8000}, {0x7f, 0x0, 0x3, 0xfff}, {0x2, 0x8001, 0x0, 0x7fff}, {0x8, 0x4, 0x101, 0xab57}, {0x8, 0x1, 0x0, 0x7}], 0x7f87}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x1, @remote={0xac, 0x14, 0x14, 0xbb}, @empty, @gre_key=0x3, @gre_key=0x6}}}}, {{@ip={@multicast2=0xe0000002, @rand_addr, 0xff000000, 0x0, 'tunl0\x00', 'ipddp0\x00', {0xff}, {0xff}, 0xff, 0x2, 0x12}, 0x0, 0x98, 0xd0}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x1, @loopback=0x7f000001, @loopback=0x7f000001, @port=0x4e22, @icmp_id=0x67}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x20}, @rand_addr=0x100000001, 0x0, 0xffffffff, 'ip6_vti0\x00', 'bridge0\x00', {}, {}, 0x0, 0x3, 0x22}, 0x0, 0x98, 0xd0}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x4, @multicast1=0xe0000001, @multicast2=0xe0000002, @gre_key=0x42b, @gre_key=0x1}}}}, {{@ip={@broadcast=0xffffffff, @dev={0xac, 0x14, 0x14, 0x10}, 0xff000000, 0xffffffff, 'sit0\x00', 'ip6gre0\x00', {0xae0037bff50cb348}, {0xff}, 0x21, 0x1, 0x2}, 0x0, 0x98, 0xd0}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x10, @broadcast=0xffffffff, @loopback=0x7f000001, @gre_key=0x8001, @gre_key=0x6}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x690) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) open(&(0x7f0000000180)='./file0\x00', 0x100, 0xa0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r2}, {r1}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r1, 0x0) 00:16:30 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1, 0xfffffffffffffffc}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) fgetxattr(r1, &(0x7f0000000140)=@known='com.apple.FinderInfo\x00', &(0x7f0000000180)=""/153, 0x99) shutdown(r0, 0x2) [ 516.508734] FAULT_INJECTION: forcing a failure. [ 516.508734] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 516.520583] CPU: 0 PID: 26857 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 516.527507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.536858] Call Trace: [ 516.539451] dump_stack+0x185/0x1d0 [ 516.543100] should_fail+0x87b/0xab0 [ 516.546830] __alloc_pages_nodemask+0x600/0x5cc0 [ 516.551587] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 516.556955] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 516.562407] ? get_page_from_freelist+0xacd1/0xb7b0 [ 516.567871] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 516.573321] ? __save_stack_trace+0x90d/0xb00 [ 516.577924] kmsan_alloc_meta_for_pages+0x81/0x3b0 [ 516.582857] ? alloc_pages_vma+0xcc6/0x17f0 [ 516.587179] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 516.592367] ? shmem_getpage_gfp+0x3991/0x59c0 [ 516.596951] ? splice_direct_to_actor+0x4cb/0x1040 [ 516.601887] ? do_sendfile+0x107b/0x1e40 [ 516.605945] ? __x64_sys_sendfile64+0x218/0x390 [ 516.610617] ? do_syscall_64+0x15b/0x230 [ 516.614682] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 516.620046] ? update_curr+0x48/0x10a0 [ 516.623938] ? check_preempt_wakeup+0xbea/0x1550 [ 516.628700] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 516.634065] ? update_curr+0x107/0x10a0 [ 516.638042] ? kmsan_set_origin_inline+0x6b/0x120 [ 516.642891] kmsan_alloc_page+0x82/0xe0 [ 516.646865] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 516.651622] ? kmsan_set_origin_inline+0x6b/0x120 [ 516.656473] ? __msan_poison_alloca+0x15c/0x1d0 [ 516.661149] ? kmem_cache_alloc+0x6c7/0xb70 [ 516.665495] ? memcg_kmem_put_cache+0x40/0x290 [ 516.670079] ? kmem_cache_alloc+0x6c7/0xb70 [ 516.674405] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 516.679775] ? kmem_cache_alloc+0xa97/0xb70 [ 516.684101] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 516.689472] ? __bitmap_intersects+0x173/0x300 [ 516.694063] alloc_pages_vma+0xcc6/0x17f0 [ 516.698220] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 516.703238] ? find_lock_entry+0xc8/0x720 [ 516.707385] ? find_get_entry+0x7ef/0x820 [ 516.711534] ? shmem_getpage_gfp+0x61f/0x59c0 [ 516.716029] ? shmem_getpage_gfp+0x61f/0x59c0 [ 516.720533] shmem_getpage_gfp+0x3991/0x59c0 [ 516.724942] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 516.729611] ? __wake_up_common_lock+0x10c/0x370 [ 516.734368] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 516.739822] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 516.745185] ? vmalloc_to_page+0x50b/0x630 [ 516.749432] ? _cond_resched+0x3c/0xd0 [ 516.753332] shmem_file_read_iter+0x508/0x1180 [ 516.757924] ? shmem_file_llseek+0xd80/0xd80 [ 516.762339] generic_file_splice_read+0x5d7/0x900 [ 516.767185] ? splice_shrink_spd+0x100/0x100 [ 516.771597] splice_direct_to_actor+0x4cb/0x1040 [ 516.776352] ? do_splice_direct+0x540/0x540 [ 516.780687] do_splice_direct+0x335/0x540 [ 516.784839] ? security_file_permission+0x1f0/0x480 [ 516.789862] do_sendfile+0x107b/0x1e40 [ 516.793762] __x64_sys_sendfile64+0x218/0x390 [ 516.798265] ? __ia32_sys_sendfile+0x160/0x160 [ 516.802849] do_syscall_64+0x15b/0x230 00:16:30 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:16:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000140)) [ 516.806741] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 516.811925] RIP: 0033:0x455ab9 [ 516.815109] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 516.822817] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 516.830083] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 516.837354] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 516.844623] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 516.851890] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 000000000000000a 00:16:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25, 0xffffffd0}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002380)=[{{&(0x7f00000004c0)=@pptp={0x0, 0x0, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000540)=""/67, 0x43}, {&(0x7f00000005c0)=""/47, 0x2f}, {&(0x7f0000000600)=""/96, 0x60}, {&(0x7f0000000680)=""/106, 0x6a}, {&(0x7f0000000700)=""/3, 0x3}], 0x5, &(0x7f00000007c0)=""/167, 0xa7, 0x1}, 0x4}, {{&(0x7f0000000880)=@nfc_llcp, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000900)=""/211, 0xd3}, {&(0x7f0000000a00)=""/51, 0x33}, {&(0x7f0000000a40)=""/120, 0x78}, {&(0x7f0000000ac0)=""/201, 0xc9}], 0x4, &(0x7f0000000c00)=""/41, 0x29, 0x6}}, {{&(0x7f0000000c40)=@can={0x0, 0x0}, 0x80, &(0x7f0000002240)=[{&(0x7f0000000cc0)=""/83, 0x53}, {&(0x7f0000000d40)=""/247, 0xf7}, {&(0x7f0000000e40)=""/139, 0x8b}, {&(0x7f0000000f00)=""/4096, 0x1000}, {&(0x7f0000001f00)=""/109, 0x6d}, {&(0x7f0000002000)=""/229, 0xe5}, {&(0x7f0000001f80)=""/51, 0x33}, {&(0x7f0000002100)=""/118, 0x76}, {&(0x7f0000002180)=""/172, 0xac}], 0x9, &(0x7f0000002300)=""/73, 0x49, 0x200}, 0x400}], 0x3, 0x160, &(0x7f0000002440)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000002540)={'bcsh0\x00', 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f0000005000)=[{{0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f0000002640)=""/205, 0xcd}, {&(0x7f0000002740)=""/69, 0x45}, {&(0x7f00000027c0)=""/97, 0x61}, {&(0x7f0000002840)=""/101, 0x65}, {&(0x7f00000028c0)=""/70, 0x46}, {&(0x7f0000002940)=""/214, 0xd6}, {&(0x7f0000002a40)=""/133, 0x85}, {&(0x7f0000002b00)=""/46, 0x2e}], 0x8, 0x0, 0x0, 0x9}, 0x7ff}, {{&(0x7f0000002bc0)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002c40)=""/223, 0xdf}], 0x1, &(0x7f0000002d80)=""/187, 0xbb, 0x5}}, {{&(0x7f0000002e40)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002ec0)=""/84, 0x54}, {&(0x7f0000002f40)=""/20, 0x14}, {&(0x7f0000002f80)=""/111, 0x6f}, {&(0x7f0000003000)=""/126, 0x7e}, {&(0x7f0000003080)=""/64, 0x40}], 0x5, 0x0, 0x0, 0xffffffffffffff32}, 0x5}, {{&(0x7f0000003140)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000033c0)=[{&(0x7f00000031c0)=""/215, 0xd7}, {&(0x7f00000032c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x1}, 0x772}, {{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000003400)=""/101, 0x65}, {&(0x7f0000003480)=""/166, 0xa6}], 0x2, &(0x7f0000003580)=""/47, 0x2f, 0x9}, 0xffffffffffffffff}, {{&(0x7f00000035c0)=@pppoe={0x0, 0x0, {0x0, @random}}, 0x80, &(0x7f0000003940)=[{&(0x7f0000003640)=""/213, 0xd5}, {&(0x7f0000003740)=""/66, 0x42}, {&(0x7f00000037c0)=""/205, 0xcd}, {&(0x7f00000038c0)=""/59, 0x3b}, {&(0x7f0000003900)=""/20, 0x14}], 0x5, &(0x7f00000039c0)=""/160, 0xa0, 0xff}, 0x1ff}, {{0x0, 0x0, &(0x7f0000003e00)=[{&(0x7f0000003a80)=""/14, 0xe}, {&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000003ac0)=""/18, 0x12}, {&(0x7f0000003b00)=""/120, 0x78}, {&(0x7f0000003b80)=""/135, 0x87}, {&(0x7f0000003c40)=""/196, 0xc4}, {&(0x7f0000003d40)=""/21, 0x15}, {&(0x7f0000003d80)=""/103, 0x67}], 0x8, &(0x7f0000003e80)=""/224, 0xe0, 0x6e}, 0x6}], 0x7, 0x100, &(0x7f0000003f80)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000051c0)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000052c0)=0xe8) rt_sigpending(&(0x7f0000000280), 0x8) getpeername$packet(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0xfffffffffffffd43) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005380)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000005840)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x85010402}, 0xc, &(0x7f0000005800)={&(0x7f00000053c0)={0x40c, r2, 0x4, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xb8, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x84}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xfffffffffffffff9}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r5}, {0xf0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xc28}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9d}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x80000000}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r7}, {0x1a8, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x20}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x4c, 0x4, [{0x9ac7, 0x8, 0xfffffffffffffff8, 0x4}, {0x37, 0x7fff, 0x7b, 0x5}, {0xfffffffffffffff7, 0x4bb875cb, 0x0, 0x3ff}, {0x6, 0x3, 0x1, 0x5}, {0x0, 0x6, 0x4, 0x8}, {0x7f, 0x0, 0x4, 0xffffffffffffffff}, {0x8001, 0x80, 0x541a, 0x7fff}, {0x4, 0x1, 0x0, 0x400}, {0x200, 0x8, 0x3, 0x726}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x8}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r10}, {0x88, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x14, 0x4, [{0xfffffffffffffffe, 0x6, 0x6, 0x10001}, {0x7fffffff, 0x3, 0x43}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r11}}}]}}]}, 0x40c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 516.870084] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 517.001783] device bridge_slave_1 left promiscuous mode [ 517.007708] bridge0: port 2(bridge_slave_1) entered disabled state 00:16:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(echainiv(ccm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x0, "4778bf7fbaf8e8caf49043c94e84bc6afb751c9e31871ee4d040b0f85c145cb2e40c7ce910b6fa1549e66861"}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], {0x0, 0x1c9c380}}) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f00000031c0)=[{{&(0x7f0000002e00)=@nfc_llcp, 0x80, &(0x7f0000003100)=[{&(0x7f0000003000)=""/97, 0x61}, {&(0x7f0000003080)=""/72, 0x48}], 0x2, &(0x7f0000003180)=""/43, 0x2b}}], 0x1, 0x0, &(0x7f0000003280)={0x0, 0x989680}) 00:16:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x6f, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359"}, &(0x7f00000005c0)=0x77) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:31 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f00000001c0), &(0x7f0000000140)=0x4) ioctl$TIOCSTI(r0, 0x5412, 0x1ff) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[{0x3}, {0x0, 0x2}, {0x3, 0x80}, {0xe, 0x5}, {0x3, 0x7}], 0x5) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000180)) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000200)=""/190, 0xbe}, &(0x7f0000000080), 0x10}, 0x20) [ 517.088718] device bridge_slave_0 left promiscuous mode [ 517.094477] bridge0: port 1(bridge_slave_0) entered disabled state 00:16:31 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x6, 0x30, 0x4, 0x4}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000001c0)={r2, 0xffff, 0x2, 0x1f}, &(0x7f0000000200)=0x10) listen(r0, 0x0) fallocate(r0, 0x8, 0x101, 0x9) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) accept(r0, &(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000180)=0x80) [ 517.169895] IPVS: ftp: loaded support on port[0] = 21 00:16:31 executing program 0 (fault-call:5 fault-nth:11): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x4100, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001340)={0xfffffffffffffffd, 0x0, 0x1, 0x8000, 0x0}, &(0x7f0000001380)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f00000013c0)=@assoc_value={0x0, 0x5}, &(0x7f0000001400)=0x8) sendmsg$inet_sctp(r1, &(0x7f00000014c0)={&(0x7f0000000140)=@in6={0xa, 0x4e24, 0xb9a, @remote={0xfe, 0x80, [], 0xbb}, 0x20}, 0x1c, &(0x7f0000001300)=[{&(0x7f0000000180)="ee16f6d26a59e88fc86f4782cb836726cc24ea920f4ef3243a09f5baa38d29f1402b0ace1c5263649cdfd9c98a61667fc4c0cc15f307e1e3eb7808e932532c6adee2b612c1ac5a778f8b77de9bc9b450b4af361b7f1e51bd53faf343d28279b674633e26a0a6636a8c479f3dfaa7152adac3d05368c5e229f752e2aaeae1ab4baae6a321e5c268c2cbed2ecd5e9ee3933beb83eb6a205a36b29b877be0d4d9b1cb0d0824189901", 0xa7}, {&(0x7f0000000240)="404608d635d848094ed82ae0ce4d70dbf8562c03e08dff707eb01c62b295ab2adcbb982b20ce66f6fb776794149e2b4c28631ebc23e88d4acbb2a12f6f2696c3438917c4d5b3da1bc2d245ba28baa8bdc964b2f144bc7c2972b4f9b00bb8e37c19e410554b20b19e8be6010080dee33b16a7f4e50d29a7877e5e3938eec5bd98815d62a1ca57801690d592b20613698a8938398f12af9dfb2dc80d5de5664738fbd41fdc53", 0xa5}, {&(0x7f0000000300)="40a4a8f1c2f79b5de0cd4cfae1e8e7c2356f17caef8870a4fbcb187fd685159bb0c71a1016b0b022676b0ffab3a6f81ac520c946d198ca7811accea5578e46bc6d71fdfc70df990c29ea7883740e43077dd34b69fd4e13822a7ab4c1d021f1a675bd906033363ae8644e94b521c8e3ed29a108cc8303fcb3fbb891876349d5ebcbcacfcd9e5c77a9b487d24921356b18f945a4095bf0d2c9d2e2441ee8b3bcff7ea0f5e1dee2b1706dabfee33b6938e9776576da63fb3ba8f61d9177229594dd7f13a5f1dfa3b56315b7f6b81a5793d898a06a38e4b8d61cdc08f120af2208c4c7961df512b2f6d7d3898338f51d73490a11ce646d93ea2495b3e501617346da2f99a39a50673636b46de451616ffb20693776134bab8664cd2850177d490fb3e720012719e3acabadf186bb0dff7756c7ba9636627a154c0241349a5c1926bcdb9136bd4db37bb6f11a9501f984f9259e2483bea9ca562998a0c8134c295ef8b7b4efca874e0c667c1ebe874349d7660ab4e3300797a0c730038c8e5d37f3beb0faf57191652cf306de637b680e957fd16febb58f071f4296e25430e805c9a6047c310f29b6278565595d24f2c265870d87c50e7adfa957b1b3b3d51814b24138508f56a8b16b16a14c499457b094045c303008a3744edf40d14f22d9e8bd8ad41008ff4d82e422444027ae4398af529079384c643949ba1a5ca0470ea9f88e0cdc57888d283ba8edf966d6461df06f4ce49354a6084bb350987e399d822199ab503977932a8ec27a751c3525a6f19632465a3915dfa0452c0b54288564808de69d4d493d75e39fd63b7bc4ad0bb721e9a39f93a2b4fab4b2c53971552bd73ac9471546b5452837f7e59baafc33eb9467cf7edf53f8f30832949d940c59e4872d24c4fae1b8b9083240fe40355551b9df7a40c60a5cde3e9fd483bb0aaecb03f0ce6c5b942913482c0f66c93f2b0d467a50e62e5e3c3951001a1a2d45e469db459ee8f845b5c80da64568d49dfc02dbe3411c1359a56467cf32d3adde2c9b60ce2cfdce651b1e0367121b71574400b7cf791963ef1f4cb604885e1062ff982ef2855a162f15aab665193fdcb146936ff482b6bb84c8d031c57f71886cdbfb6f83f2d573f75b6c616a47519891305bb93a16891d2f69466bcb6c95cc582d6bb92c4f3b6cec0bb673ceb0434a46f9ae8a9fb401bbdc289a7853bb3cdc37f4e6e6bb8d3eeffbd9eaae2296179be1504c41713f5a61f13ca9f55f47fd18f40be7d3b468f698c2ffa4a0f9b950ab9483afab42c35b2774f605bb4a67db5a5a5b112c4a15378d798612cf5834d67d3f04d36928748d1525eb52ace9f523b2f29e24c5fa6a1a6e7d6aa3b670bea15e761c4a738f29ceef8fe67cf91132d4c60b91bbb2d5d8b2ae7986986a4532ae3cbb73ac6dcfbae18dd6845eb4e6bc43037721eb05340088431a17a4b11062ac51d3c787a5b5b794d5f6d86d5b6a18ee58f16387ccbf84d95f6cf0de717e0e13c83800e057a0b3fa79e8463bac32b9692b804fba2fca4215d6a0138b8bacf31bd8650880fb32649c9fa635c6d0cf6ff751f43e87ba66f73d8fe317d08872b99283f9276432ca4ee1e4f8468c3a47a0d0b41e02eaf792aab6ed8b80ff246b7c7d22bfe6a219190ea20b776244d1ac4ee1d51014119548900d999d5896dbf6c52c8966117cfbd0eaa9d941743ac49492a62ca9173e9db03eba435b4e22499184a01fe6de328b9479496e677072d54b0d52adb75ba478975424b0a749eeaf391072091b5d4a9a2d169fbc0b57c4383fc9edb8ea86779c3c3b1576b6eacd8bc34c85822e856865551a2ee67f5369a4cb2a8ff2363ca2cd439db0d98bbee613a1d3ed8c55f33f6a0ddc973205d057aea452bcf2f5d460af849e825f94064aa2be4d2bc17081068aa9e3a605f5ecca90140b037dd8fd3673818d7bcbb550eb2bea0f4ba99888ae7c3d1db2c157b4499507e342fe5ff597e7249fc1d93f64a8f681983861e579bc250e1bc8e556d1ebca910049d6502b9fcf68547b8e172ed51381ef9828cebe9eb04a4a4be9c138d1e99733a2637d4cf738880fdaa4b32b225c5bac2d877cf559b0dc0b9fac80044482918f9d952bcdb1e7f48a120b6e0b116c8f9bb9e6316606e63cf37c99a7ac053917156bcc642d8a95b064a319421d261c6d16462dbdbef09f11c9513b610996b781e6ff7820524a62d06f88ac51220ad9636d88060e80af32f6128d40bf07b7f8457599f91d11a61543c08a11b99d3b9ce0528e7765a2412f69662b58e4f3ba315e0150a2e25b863a8a3226c11c9a9edaf3c15dd6455fa3ec2b156371a422ac5644d9683d0d1f546e00167d1eb13625c7a41bac7bff404d389b1f18a9207a10dbb0eac3b9b09fa9866824f168f9e25d98bdacd8aeded027d13404f421c3ddffa58279418d66567805a787d92e0091c043a32ab79b8be17fc2866af3d2eb3f6669fc2b604c8967edeb5b93f82a2c7f29afff0fb25d7bcde6cbf69696896eb2dcbdba7071c9fa42fc4f76498c1af13d88fbff439ed2dde1285b7f593ee58d7de2baaf1342f044fb5ca1ddcc0dac8a8452283b2106e55652dedfdc19deef1dc4f855e7b51a4061b3f947861ac3348aaeb7f108b87fb45768abd32ce27d96687ed67a66ce0b79fedd3f7d6b7fdce242b27e7e7de4847f284ac1db54b919a615853f6a0482b39312e72ce789dbefee2f8a354d293165be304d8a624a984882ef09e4c91a600da2505fefd1d61d7fadb06a1dcf28dcac343bb72a536a0f2ae755c37371a3c129b1ac1543a85fafd0a971af09e9b5ce22d91514d3b5225a4931e34927c727e528179123c9a461484333379336e802358d45c6468dfc0623794efc184abaaf48e502881a9c4e207125adb844c65dad5398408799f3469ac2324e52c227202fa1a71c1fd519b16a59fef111afda3e66dc9bbfe59dab39ac7c788db1ce06e4b8d9b731b2083ad26aee254cfb2e3087f0a09c4ca76899363a03b36be18fe8ce067384e3e2e2fd5c38cffbc0b38e9b4390acfbc838ef7c5047bdbb3eecd969ff657d5ca4d272ad924bdd656ac91f5fa2d78d88c214c21923f9161caff6e7827bc3c32b83cfd662cd22d5a902202aa6c51ca8d87344928f5937027663a06b9b7cd1797f8e90c2f1b48590d04681f39d663201986e114f016fbec22074cc1e064dc21e0b2ff96982d3cba078fb670811cbe3d4612757de5c65c37af263ae486ee7d2c6ee3ee56fccf520f78c733159b0086688f6c4d3afecd1531493e98bb7e948d6efe0ff97009e9bce74f133e01206ca4ae73d32fe9e97a01b5e2cea317719d669c7292526d38907cca4a6a40ddb7e05f36a3632ff98d33068007893ffd7ecebf86269978ea3b8107fc71da5a96a8be711a54662c50a3d7cb576b4893d96494a57d39d3fc39491591c546945c23f02a5216c62b2f7b1528aab2acd832ec2744658f1ceea750d09a03ebd4ba65dadd98a33427882eb7baa8eb09f6b1280f6a40c932722d7508310fbd913e5b9161fe9196055f9a7d9529d466d9e37e5ccc15da2e9e694ab563e368b4aaeb050fe026b307f28dc3c7c83cbcd6c142267054cd22b2cf076b18747af33834228a2cecb1797c37efa2af50fc336044adfe136a4cb54c9903aa2d917584c8024be059994a09f16f9c9f5146ab5c1f518a5d47d07da2db073fece56c742f9e95f91637e675f1b0cf70def6bb4cf8f2a46f3a2bc57952e4ed96dbe4d9be7f3a18eae31d7c5359a3f91a2f13082ea52d2b2156f67d08aba88b8c16537dfbba8d6b468c53817d5b027f29283dd6fcd3dd694e21b13c923ba7ed99d14ba3183bc79d176c8b25f4965e6f43e75520e4343a3f1282d35457ce0feb8265a64e9d7e25eab5f1fa01b3a35b98eef5ac6ccd457b89452d1937f1f4f96bcfacc1a86e4e924d30800052c63343071a8a86d706130a2675da738817e2ff3aaacac12df51eea216164392ab11eed40464bb4316a1e736f9a6c80d6947e911420d8aece7c448c7d49160d4d40bfe5562ff4bf2da86160ea1988b239fe263bd2229c25f973e81626e140ddd8ed3be02119b55adb22c0673dbc240acec4e32e1fb35f35f37a9f087b7b925fc6c5ffcb6459d406e3a6d3b08357739e8c10d0c89209139f1cf1db9c6c3e5f5826e9bd4a1c6ebbf03ce80d706039e9a3d51ee3e775018b956667699e27c38eff691cf1724b40c9dad8e62ecbdf26475a09e4b42c7508bcc190a1fc30bc097d297c02d8e85441aec64a2668d5913349db6ea65920856cdb3ee5826f0ac21d91410952440bbf86ef27d6c118f13f15637c27972bb26ff5c1db676119feeee0dba54110cb1716b2d9728bd6e018e0e28973a37b7a415f7dbb53e53117afb1bb3bce7f783a83f0be9e6dc8a2d32e7feba5e213277f4e4e90d55892866d1c4bff2978d8ecf618b9a5ea5462b64aa9685d61959afbaffaf78c3229c5de6af489b7e910cc48412b1db252a02226ead3b6698f0cac7c1298cf1e77658c687ed5fc73a10ce896124065315a5a3a79012d16c9862fd5c9c4b48a095428746c8693698671c019d6dfa36853f836d26f6a1dfd61ff5468cbf1df0917359399582047a6b233c3ad6398ad36a41bb4e045cf2752130fea2217bb64647aa52cb204a3c41c2d96db58b9a8c859bd9aa23bb95fc848e3decdd344fa21a590d292301298a618aba08970cdf59af6474ae2cfabab591161b4300d1f20b6a98c59180ffa0ccadee2dc8b2756d70320551a28213abc90e4ded463b0646196439d8036dc0745205efffbf8a8566a8668d927ac6ea59083822662a180bbec20c38467185971a07c1adc868c46a9e8f03133407393d441ca9ef648cfa54ad9654be661111c76b3582cdc76dc4d5c6168b8b3cda51dfdc958ff8525dafb0ec1e472f15753de229f281e67975f1d01a9e5de3f542f5b44c3c44f8d8130950cf4ef56b789fbb17167e5899fb1b61a68976628ed2e194a6d18a39f1a40bfe48e2c3aa64a4338b6cbd23b65b16b26d3ef61d7c3207ae204bf75140df5c16bfa3ca12dd9d5530119a557879bd7e347ead4b735726f6bbb885ede67cc6ff5ba7e24ea7a93b318eb84cbdc57528e9b2042d5f774f84842a34e68df9e0e28ce4b2180775c600b940faa80358ebe761fedb60470212d22b55707e5088445c27c239fd408da7c2aa48f0d78a47f646ddbb3c24bd2f2e39cf6f2ef398a816e944029f7b0fb486dfc8735b4bb83f385cab4c837dfceca13ea5439b3ff952343d2ce99f3ccaab0098e1c502b8b1a155818fdfec7e1278b8a5d45ba0a28dbf7757ffd224abcfc9162106929fdb6495d8c289e5d78d62802a1b967bc129c452e4f189c6e323cf15674a042ba71b933051730172945f6de816c00a48db1b7f8f8f4ebe140f09893ebd11758ef4e9b42deaa8fb5db32c9d00971d21c256073c354f98b2c5c13eca3c05cb802f503a8a68519f023931e06d2211ebf78092153e33e6a6278bd47fe4a6bffad6504b7f23cebbb94f416f4da58c11a0abdcfc90a588e729d43f322b03615b20fc4f579909b112fe64bfce1856f0f21c70d742ab8c1b5e1289dd8d2e3027c7f3cb506ecfc0459744b2f7780cec41b9d7824a860615c68d25a3e753ca976026794113040f92ff4233fdb66e06e430389313a7b05cc0e9c3bcaba8ebaa411eb0ff175af2bba94e6c40c0c33dc23bd3dd4a2840d0e3f70d843c4e84398524b73f902ca7422c5e471fac5f4d9baa3a5ba1a424560a84b12229a4d1b123817eb4172b36472a040e00", 0x1000}], 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000000000084000000050000000000000003000000300000000000000084000000010000000005c7deb09e00000007000000380700002a000000a3", @ANYRES32=r2, @ANYBLOB="3000000000000000840000000100000009002f9f0e800000040000000400000040000000430000008b000000", @ANYRES32=r3], 0x78}, 0x200080c4) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000001680)=0x3f) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x400000, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000001480)='team\x00') accept$packet(r1, &(0x7f0000001580)={0x0, 0x0, 0x0}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast, @loopback}, &(0x7f0000001640)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001bc0)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000001c00)={@rand_addr, @broadcast, 0x0}, &(0x7f0000001c40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001c80)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000001ec0)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001e80)={&(0x7f0000001cc0)={0x18c, r4, 0x300, 0x70bd2c, 0x25dfdbfe, {0x1}, [{{0x8, 0x1, r5}, {0x170, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfffffffffffffb65}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xc0000000000}}}]}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x41}, 0x8001) [ 517.266114] team0 (unregistering): Port device team_slave_1 removed [ 517.304565] team0 (unregistering): Port device team_slave_0 removed [ 517.334752] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 517.349966] FAULT_INJECTION: forcing a failure. [ 517.349966] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 517.361823] CPU: 1 PID: 26892 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 517.368758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.378116] Call Trace: [ 517.380716] dump_stack+0x185/0x1d0 [ 517.384352] should_fail+0x87b/0xab0 [ 517.388075] __alloc_pages_nodemask+0x600/0x5cc0 [ 517.392835] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 517.398210] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 517.403665] ? get_page_from_freelist+0xacd1/0xb7b0 [ 517.408685] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 517.414137] ? __save_stack_trace+0x90d/0xb00 [ 517.418651] kmsan_alloc_meta_for_pages+0x109/0x3b0 [ 517.423667] ? alloc_pages_vma+0xcc6/0x17f0 [ 517.427996] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 517.433186] ? shmem_getpage_gfp+0x3991/0x59c0 [ 517.437768] ? splice_direct_to_actor+0x4cb/0x1040 [ 517.442700] ? do_sendfile+0x107b/0x1e40 [ 517.446764] ? __x64_sys_sendfile64+0x218/0x390 [ 517.451437] ? do_syscall_64+0x15b/0x230 [ 517.455500] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 517.460865] ? update_curr+0x48/0x10a0 [ 517.464753] ? check_preempt_wakeup+0xbea/0x1550 [ 517.469507] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 517.474869] ? update_curr+0x107/0x10a0 [ 517.478845] ? kmsan_set_origin_inline+0x6b/0x120 [ 517.483694] kmsan_alloc_page+0x82/0xe0 [ 517.487673] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 517.492432] ? kmsan_set_origin_inline+0x6b/0x120 [ 517.497283] ? __msan_poison_alloca+0x15c/0x1d0 [ 517.502039] ? kmem_cache_alloc+0x6c7/0xb70 [ 517.506368] ? memcg_kmem_put_cache+0x40/0x290 [ 517.510948] ? kmem_cache_alloc+0x6c7/0xb70 [ 517.515279] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 517.520650] ? kmem_cache_alloc+0xa97/0xb70 [ 517.524984] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 517.530354] ? __bitmap_intersects+0x173/0x300 [ 517.534946] alloc_pages_vma+0xcc6/0x17f0 [ 517.539113] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 517.544135] ? find_lock_entry+0xc8/0x720 [ 517.548289] ? find_get_entry+0x7ef/0x820 [ 517.552425] ? shmem_getpage_gfp+0x61f/0x59c0 [ 517.556904] ? shmem_getpage_gfp+0x61f/0x59c0 [ 517.561384] shmem_getpage_gfp+0x3991/0x59c0 [ 517.565775] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 517.570423] ? __wake_up_common_lock+0x10c/0x370 [ 517.575158] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 517.580600] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 517.585962] ? vmalloc_to_page+0x50b/0x630 [ 517.590196] ? _cond_resched+0x3c/0xd0 [ 517.594072] shmem_file_read_iter+0x508/0x1180 [ 517.598654] ? shmem_file_llseek+0xd80/0xd80 [ 517.603048] generic_file_splice_read+0x5d7/0x900 [ 517.607873] ? splice_shrink_spd+0x100/0x100 [ 517.612271] splice_direct_to_actor+0x4cb/0x1040 [ 517.617023] ? do_splice_direct+0x540/0x540 [ 517.621352] do_splice_direct+0x335/0x540 [ 517.625485] ? security_file_permission+0x1f0/0x480 [ 517.630484] do_sendfile+0x107b/0x1e40 [ 517.634356] __x64_sys_sendfile64+0x218/0x390 [ 517.638859] ? __ia32_sys_sendfile+0x160/0x160 [ 517.643431] do_syscall_64+0x15b/0x230 [ 517.647313] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 517.652493] RIP: 0033:0x455ab9 [ 517.655661] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 517.663353] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 517.670612] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 517.677860] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 517.685110] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 517.692362] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 000000000000000b [ 517.712558] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 517.758954] bond0 (unregistering): Released all slaves [ 518.762484] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.768885] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.776162] device bridge_slave_0 entered promiscuous mode [ 518.816340] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.822757] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.830184] device bridge_slave_1 entered promiscuous mode [ 518.871441] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 518.912864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 519.028742] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 519.070780] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 519.256127] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 519.263519] team0: Port device team_slave_0 added [ 519.302564] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 519.309751] team0: Port device team_slave_1 added [ 519.348737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 519.390628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 519.432079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 519.439266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 519.448441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 519.484393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 519.491584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 519.500895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 519.900434] bridge0: port 2(bridge_slave_1) entered blocking state [ 519.906836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 519.913568] bridge0: port 1(bridge_slave_0) entered blocking state [ 519.919939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 519.927905] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 520.863170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 521.416294] 8021q: adding VLAN 0 to HW filter on device bond0 [ 521.560371] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 521.706495] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 521.712713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 521.720842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 521.864910] 8021q: adding VLAN 0 to HW filter on device team0 [ 522.720624] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 522.731665] syz-executor7 cpuset=syz7 mems_allowed=0 [ 522.737225] CPU: 1 PID: 26876 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 522.744175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.753519] Call Trace: [ 522.756110] dump_stack+0x185/0x1d0 [ 522.759734] dump_header+0x2cc/0x16f0 [ 522.763526] ? __msan_poison_alloca+0x15c/0x1d0 [ 522.768218] ? oom_kill_process+0x2e0/0x2160 [ 522.772630] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 522.778084] ? ___ratelimit+0x67f/0x760 [ 522.782073] oom_kill_process+0x341/0x2160 [ 522.786322] ? mem_cgroup_scan_tasks+0x289/0x610 [ 522.791081] out_of_memory+0x1700/0x1da0 [ 522.795145] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 522.800506] ? _cond_resched+0x8b/0xd0 [ 522.804413] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 522.809596] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 522.814972] pagefault_out_of_memory+0x57/0x110 [ 522.819642] mm_fault_error+0x460/0x7c0 [ 522.823643] __do_page_fault+0x1274/0x1a10 [ 522.827882] do_page_fault+0xb7/0x250 [ 522.831687] ? page_fault+0x8/0x30 [ 522.835223] page_fault+0x1e/0x30 [ 522.838664] RIP: 0033:0x407198 [ 522.841841] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 522.847200] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 522.854462] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 522.861725] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 522.868988] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 522.876258] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 522.883998] Task in /syz7 killed as a result of limit of /syz7 [ 522.890103] memory: usage 1196kB, limit 0kB, failcnt 100 [ 522.895612] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 522.902413] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 522.908598] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 522.928410] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 522.937230] [26876] 0 26876 17553 8392 114688 0 0 syz-executor7 [ 522.946112] Memory cgroup out of memory: Kill process 26876 (syz-executor7) score 8420000 or sacrifice child [ 522.956167] Killed process 26876 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB 00:16:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000040)=""/4096) 00:16:37 executing program 7: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x201, 0x0) r3 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r3, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$cgroup_pid(r2, &(0x7f0000000280)=ANY=[], 0x74) syz_open_pts(r2, 0x8200) close(r2) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000085, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(r0, 0xfffffffffffffffc) 00:16:37 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, &(0x7f0000000080)}}], 0x1c) r1 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x2) ioctl(r2, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") bind$unix(r0, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc05c5340, &(0x7f0000dc5f98)) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x4d8, 0x7, 0x9, 0x9, 0x0, 0xfffffffffffffff7, 0x23, 0x7, 0x4, 0x4, 0x7, 0x2000000000000000, 0x678000000000, 0x8, 0x4, 0x5, 0x9, 0x800, 0x5, 0x2, 0xfff, 0x7f, 0x9, 0x800, 0x80000000, 0x1, 0x6a, 0x80000001, 0x6d, 0x5, 0x200, 0x6, 0x400, 0x9, 0x3, 0x400, 0x0, 0xfffffffffffff001, 0x0, @perf_config_ext={0x6a3, 0x8}, 0x0, 0x0, 0x26, 0x1, 0x3, 0xc5, 0x6}, r1, 0x2, r0, 0xa) 00:16:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="ba00000044910fcb69ede9594efc63afb237e51a478e784b0159a90f05ed713e771d7476110ae40b902e3c840339703ad8e0288958f37ab7a7e6226fce071d8106404277333e39c295475d7da95577696140177d1d2bfe3ff4985c2683732fcd3282cb5d636ee4f8d663163c83f400d451ffbdd4d3f8bb416407cb2e4307f51dbf78b3b60ee14256b7ff83559c425b37205666b912bb7b561efce7de5a8fdf1626c91a23facef38a9e087e98aa0a97cb7da43148261f98976a84e898e67720f1b91d5bfd1df56aa70e11d3e8e4680d23ea3d1f07d186536671d4cdfe7742676f34101010c00cd96263c879552d871c120505fda1ce997ac9b1051818412beb7931e924ffe72dda7e68db0a6ca748afcc93ec4f92e0613e"], &(0x7f0000000340)=0xc2) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000380)={0x9, 0x4, 0x4d31, 0x2, r4}, &(0x7f00000003c0)=0x10) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r5, 0x40485404, &(0x7f00000001c0)={{0xffffffffffffffff, 0x3, 0x81, 0x1, 0x131}, 0x1f, 0x2}) shutdown(r3, 0x4000000004) 00:16:37 executing program 0 (fault-call:5 fault-nth:12): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:37 executing program 6: clock_gettime(0x7, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) recvmmsg(r1, &(0x7f0000001fc0)=[{{&(0x7f0000000380)=@hci, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/53, 0x35}, {&(0x7f0000000500)=""/219, 0xdb}], 0x3, &(0x7f0000000640)=""/200, 0xc8, 0x3}, 0x7f}, {{&(0x7f0000000740)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f00000007c0)=""/192, 0xc0}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)}, {&(0x7f0000000940)=""/132, 0x84}, {&(0x7f0000000a00)=""/163, 0xa3}, {&(0x7f0000000ac0)=""/61, 0x3d}], 0x6, 0x0, 0x0, 0x2}, 0x3ff}, {{&(0x7f0000000b80)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c00)=""/222, 0xde}], 0x1, &(0x7f0000000d40)=""/143, 0x8f}}, {{&(0x7f0000000e00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000000e80)=""/12, 0xc}, {&(0x7f0000000ec0)=""/81, 0x51}, {&(0x7f0000000f40)=""/4096, 0x1000}], 0x3, &(0x7f0000001f80)=""/61, 0x3d, 0x6}, 0x1}], 0x4, 0x2, &(0x7f00000020c0)={0x77359400}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000240)=0x28, 0x4) shutdown(r0, 0x2) ppoll(&(0x7f0000000180)=[{r0, 0x4002}, {r1, 0x2}, {r0, 0x10}, {r0, 0x1}, {r1, 0x4000}], 0x5, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)={0x7}, 0x8) r3 = fcntl$dupfd(r1, 0x406, r0) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f0000000280)={0x80000001, {{0xa, 0x4e23, 0x8, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x10000}}}, 0x88) signalfd4(r0, &(0x7f0000000340)={0x10000}, 0x8, 0x80000) 00:16:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:37 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20100, 0x100) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000180)=@in={0x2, 0x4e23, @broadcast=0xffffffff}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)="313bd6081fb3", 0x6}, {&(0x7f0000000240)="c2d978afec321c53bef23e145a0cdc30202da1a3390ad36811d6688cfbc5576cfe4a32ec703bfc3c7e57a9e31e5c6782115509fc532bc2e6d977f7feb218e9968e016425e3ce82af4fd3a4ddc960034424a83a239d6f7fe71389654d89d33fb0dea8821b183cefe63ab40559337e4c409ec40596a5b903bd0be35b656e8f84484d890965a4f75d8cfff5fa9fae60a7555f16f2135b678fb073b5766c8854ddd1ee926b0d581e3d604208be509717a5f369af177e8cdf4b724b82156615e0", 0xbe}], 0x2, &(0x7f0000004900)=ANY=[@ANYBLOB="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"], 0x2180, 0x4008015}, 0x3b80751484baf643) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x2a5c1b9995d21a0e, 0x0) linkat(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000004c0)=""/126, 0x7e}, {&(0x7f0000000540)}, {&(0x7f0000001780)=""/4096, 0xfffffffffffffece}, {&(0x7f0000000580)=""/149, 0xfffffffffffffc5e}, {&(0x7f0000000640)=""/59, 0x3b}], 0x1000000000000041, &(0x7f00000008c0)=""/113, 0x71, 0x40}, 0x2) sendto(r2, &(0x7f0000000380)="3634519842da56a9c30a8d43b67eb04206504262d95cda6a1c4e314cb193b7f07addcf348f448d364e6ddb1b4dd0413541b3b71d0f605e90a704727ebd79439a2fc88b7503706cb01e36f16f72c24078a6122d4cf387fe87feb4ae00317958215f23c7bae90dcf", 0x67, 0x48000, &(0x7f0000000440)=@ll={0x11, 0x18, r3, 0x1, 0x8, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x6}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000740)='N', 0x1}], 0x1, &(0x7f0000000000)}, 0x20004040) [ 523.163282] FAULT_INJECTION: forcing a failure. [ 523.163282] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 523.175447] CPU: 1 PID: 27178 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 523.182397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.191775] Call Trace: [ 523.194407] dump_stack+0x185/0x1d0 [ 523.198082] should_fail+0x87b/0xab0 [ 523.201864] __alloc_pages_nodemask+0x600/0x5cc0 [ 523.206661] ? kmsan_set_origin_inline+0x6b/0x120 00:16:37 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xff, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x6) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x80000000, 0x4207ff) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000140)=0x6) fanotify_mark(r0, 0xc0, 0x0, r1, &(0x7f00000000c0)='./file0\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) [ 523.211559] ? __msan_poison_alloca+0x15c/0x1d0 [ 523.216262] ? kmem_cache_alloc+0x6c7/0xb70 [ 523.220624] ? memcg_kmem_put_cache+0x40/0x290 [ 523.225236] ? kmem_cache_alloc+0x6c7/0xb70 [ 523.229612] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 523.235032] ? kmem_cache_alloc+0xa97/0xb70 [ 523.239395] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 523.244784] ? __bitmap_intersects+0x173/0x300 [ 523.249422] alloc_pages_vma+0xcc6/0x17f0 [ 523.253640] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 523.258735] ? find_lock_entry+0xc8/0x720 00:16:37 executing program 1: r0 = socket(0x0, 0x3, 0x5) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r1}) r2 = socket(0x18, 0x0, 0x1) connect(r2, &(0x7f0000dcd000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x2}}, 0x2e) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x1, 0x0, 0x5, 0x8ba, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={r3, 0x94, &(0x7f0000000180)=[@in={0x2, 0x4e21, @multicast2=0xe0000002}, @in={0x2, 0x4e22, @multicast1=0xe0000001}, @in6={0xa, 0x4e24, 0xffffffff, @empty, 0x2}, @in6={0xa, 0x4e22, 0x10001, @loopback={0x0, 0x1}, 0x7}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in6={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xa1}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f0000000280)=0x10) epoll_create(0x9) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000000)={'bond_slave_1\x00', 0x7f}) unshare(0x400) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x111, 0x11, &(0x7f000087bff8), &(0x7f0000f5fffc)=0x8) [ 523.262936] ? find_get_entry+0x7ef/0x820 [ 523.267141] ? shmem_getpage_gfp+0x61f/0x59c0 [ 523.271692] ? shmem_getpage_gfp+0x61f/0x59c0 [ 523.276238] shmem_getpage_gfp+0x3991/0x59c0 [ 523.280702] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 523.285417] ? __wake_up_common_lock+0x10c/0x370 [ 523.290231] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 523.295826] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 523.301254] ? vmalloc_to_page+0x50b/0x630 [ 523.305582] ? _cond_resched+0x3c/0xd0 [ 523.309521] shmem_file_read_iter+0x508/0x1180 [ 523.314163] ? shmem_file_llseek+0xd80/0xd80 [ 523.318628] generic_file_splice_read+0x5d7/0x900 [ 523.323541] ? splice_shrink_spd+0x100/0x100 [ 523.328013] splice_direct_to_actor+0x4cb/0x1040 [ 523.332820] ? do_splice_direct+0x540/0x540 [ 523.337218] do_splice_direct+0x335/0x540 [ 523.341426] ? security_file_permission+0x1f0/0x480 [ 523.346491] do_sendfile+0x107b/0x1e40 [ 523.350466] __x64_sys_sendfile64+0x218/0x390 [ 523.355011] ? __ia32_sys_sendfile+0x160/0x160 [ 523.359625] do_syscall_64+0x15b/0x230 [ 523.363557] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 523.368766] RIP: 0033:0x455ab9 [ 523.371978] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 523.379724] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 523.387015] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 523.394310] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 523.401603] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 523.408894] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 000000000000000c [ 523.554618] device bridge_slave_1 left promiscuous mode [ 523.560462] bridge0: port 2(bridge_slave_1) entered disabled state 00:16:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={0x0, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) r2 = dup2(r1, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{0x0, 0x2, 0x1ff, 0x800}, {0x3, 0x7, 0x800, 0x8}, {0x100, 0x8, 0x0, 0xff}, {0x3, 0x2, 0x8, 0x8}, {0x7, 0x6, 0x3, 0x9}, {0x4, 0xfffffffffffffff9, 0xb69, 0x5}]}, 0x10) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000000c0)={r3, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xe}}, 0x10) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000003c0)={0x6, 0x118, 0xfa00, {{0xf16, 0x1, "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", 0xcf, 0x7fffffff, 0x6, 0xfa2, 0x8, 0x100000001, 0x3ff}, r4}}, 0x120) getsockname$unix(r2, &(0x7f0000000340), &(0x7f0000000180)=0x6e) 00:16:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000040)={0x9, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/87) [ 523.637720] device bridge_slave_0 left promiscuous mode [ 523.643565] bridge0: port 1(bridge_slave_0) entered disabled state 00:16:37 executing program 0 (fault-call:5 fault-nth:13): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:37 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f00000013c0)=[{{&(0x7f0000000140)=@pppol2tpv3in6, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000001300)=""/189, 0xbd}, 0x8}], 0x1, 0x0, &(0x7f00000014c0)={0x77359400}) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f00000019c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f00000007c0), 0x33d}]) r1 = getpgrp(0x0) ptrace$getenv(0x4201, r1, 0x9, &(0x7f0000000080)) [ 523.816897] team0 (unregistering): Port device team_slave_1 removed [ 523.864169] team0 (unregistering): Port device team_slave_0 removed [ 523.869050] FAULT_INJECTION: forcing a failure. [ 523.869050] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 523.882419] CPU: 0 PID: 27212 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 523.889333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.898676] Call Trace: [ 523.901262] dump_stack+0x185/0x1d0 [ 523.904894] should_fail+0x87b/0xab0 [ 523.908616] __alloc_pages_nodemask+0x600/0x5cc0 [ 523.913378] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 523.918749] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 523.924203] ? get_page_from_freelist+0xacd1/0xb7b0 [ 523.929224] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 523.934676] ? __save_stack_trace+0x90d/0xb00 [ 523.939187] kmsan_alloc_meta_for_pages+0x81/0x3b0 [ 523.944116] ? alloc_pages_vma+0xcc6/0x17f0 [ 523.948442] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 523.953633] ? shmem_getpage_gfp+0x3991/0x59c0 [ 523.958218] ? splice_direct_to_actor+0x4cb/0x1040 [ 523.963148] ? do_sendfile+0x107b/0x1e40 [ 523.967210] ? __x64_sys_sendfile64+0x218/0x390 [ 523.971876] ? do_syscall_64+0x15b/0x230 [ 523.975933] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 523.981294] ? __msan_poison_alloca+0x15c/0x1d0 [ 523.985967] ? kmsan_set_origin_inline+0x6b/0x120 [ 523.990811] kmsan_alloc_page+0x82/0xe0 [ 523.994784] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 523.999539] ? kmsan_set_origin_inline+0x6b/0x120 [ 524.004396] ? __msan_poison_alloca+0x15c/0x1d0 [ 524.009063] ? kmem_cache_alloc+0x6c7/0xb70 [ 524.013490] ? memcg_kmem_put_cache+0x40/0x290 [ 524.018073] ? kmem_cache_alloc+0x6c7/0xb70 [ 524.022401] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 524.027766] ? kmem_cache_alloc+0xa97/0xb70 [ 524.032105] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 524.037492] ? __bitmap_intersects+0x173/0x300 [ 524.042077] alloc_pages_vma+0xcc6/0x17f0 [ 524.046237] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 524.051259] ? find_lock_entry+0xc8/0x720 [ 524.055409] ? find_get_entry+0x7ef/0x820 [ 524.059559] ? shmem_getpage_gfp+0x61f/0x59c0 00:16:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) 00:16:38 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x6) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) syncfs(r1) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) [ 524.064058] ? shmem_getpage_gfp+0x61f/0x59c0 [ 524.068560] shmem_getpage_gfp+0x3991/0x59c0 [ 524.072459] IPVS: ftp: loaded support on port[0] = 21 [ 524.072968] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 524.072996] ? __list_add_valid+0xb8/0x450 [ 524.087747] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 524.093199] ? pick_next_task_fair+0x22c9/0x2530 [ 524.097976] shmem_file_read_iter+0x508/0x1180 [ 524.102571] ? shmem_file_llseek+0xd80/0xd80 [ 524.106983] generic_file_splice_read+0x5d7/0x900 [ 524.111837] ? splice_shrink_spd+0x100/0x100 [ 524.116249] splice_direct_to_actor+0x4cb/0x1040 [ 524.121051] ? do_splice_direct+0x540/0x540 [ 524.125371] do_splice_direct+0x335/0x540 [ 524.129509] ? security_file_permission+0x1f0/0x480 [ 524.134519] do_sendfile+0x107b/0x1e40 [ 524.138402] __x64_sys_sendfile64+0x218/0x390 [ 524.142881] ? __ia32_sys_sendfile+0x160/0x160 [ 524.147442] do_syscall_64+0x15b/0x230 [ 524.151327] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 524.156495] RIP: 0033:0x455ab9 [ 524.159663] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 524.167350] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 524.174605] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 524.181858] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 524.189108] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 524.196355] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 000000000000000d [ 524.208326] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 524.280154] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 524.374107] bond0 (unregistering): Released all slaves [ 525.291425] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.297839] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.305216] device bridge_slave_0 entered promiscuous mode [ 525.345083] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.351470] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.358729] device bridge_slave_1 entered promiscuous mode [ 525.399136] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 525.439559] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 525.556668] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 525.599097] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 525.781226] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 525.788658] team0: Port device team_slave_0 added [ 525.828443] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 525.835689] team0: Port device team_slave_1 added [ 525.875539] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 525.915129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 525.955959] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 525.963302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 525.972367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 526.006802] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 526.013963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 526.023102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 526.419925] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.426350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 526.433115] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.439534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 526.447113] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 527.456192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 527.971413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 528.112908] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 528.252255] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 528.258448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 528.266155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 528.404954] 8021q: adding VLAN 0 to HW filter on device team0 [ 529.238867] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 529.249939] syz-executor7 cpuset=syz7 mems_allowed=0 [ 529.255189] CPU: 0 PID: 27216 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 529.262126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.271473] Call Trace: [ 529.274072] dump_stack+0x185/0x1d0 [ 529.277788] dump_header+0x2cc/0x16f0 [ 529.281588] ? __msan_poison_alloca+0x15c/0x1d0 [ 529.286258] ? oom_kill_process+0x2e0/0x2160 [ 529.290678] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 529.296132] ? ___ratelimit+0x67f/0x760 [ 529.300114] oom_kill_process+0x341/0x2160 [ 529.304353] ? mem_cgroup_scan_tasks+0x289/0x610 [ 529.309111] out_of_memory+0x1700/0x1da0 [ 529.313175] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 529.318536] ? _cond_resched+0x8b/0xd0 [ 529.322439] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 529.327628] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 529.333016] pagefault_out_of_memory+0x57/0x110 [ 529.337693] mm_fault_error+0x460/0x7c0 [ 529.341684] __do_page_fault+0x1274/0x1a10 [ 529.345922] do_page_fault+0xb7/0x250 [ 529.349726] ? page_fault+0x8/0x30 [ 529.353259] page_fault+0x1e/0x30 [ 529.356711] RIP: 0033:0x407198 [ 529.359888] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 529.365243] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 529.372518] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 529.379776] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 529.387035] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 529.394293] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 529.402051] Task in /syz7 killed as a result of limit of /syz7 [ 529.408118] memory: usage 1196kB, limit 0kB, failcnt 108 [ 529.413629] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 529.420476] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 529.426677] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 529.446503] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 529.455294] [27216] 0 27216 17553 8393 114688 0 0 syz-executor7 [ 529.464172] Memory cgroup out of memory: Kill process 27216 (syz-executor7) score 8421000 or sacrifice child [ 529.474214] Killed process 27216 (syz-executor7) total-vm:70212kB, anon-rss:84kB, file-rss:33488kB, shmem-rss:0kB [ 529.505891] oom_reaper: reaped process 27216 (syz-executor7), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB 00:16:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000440)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a668e021abbb0357b9a3d57bffd67565eff360600000000000000a524243e0acea795b24013d20da641c0a4c72bd4d4adf0d48e0268d3de9923a784a4534e08929f04465a2b4dd1347739717f73dae39d4d5b34eed7f7a481fb59fe6578c079f5be9dbe372e05a9a147c64fc1b146554f769e08eda48baf0728405cf96c3c3f546039a41e4a6095f41360238f08fbdab68004c62cee9be1bce99b878812c0cb55b28161271976c7965c680befbecbba33144b") fchmod(r0, 0x1) getpid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) flistxattr(r0, &(0x7f0000004600)=""/255, 0xff) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'ipddp0\x00', {0x2, 0x4e22, @multicast2=0xe0000002}}) 00:16:43 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000080)={0x0, 0x1000}) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ENDIAN(r2, 0x4008af13, &(0x7f0000000040)={0x0, 0x8d}) 00:16:43 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x3}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f0000000140), 0xfffffffffffffdb5) shutdown(r0, 0x2) pread64(r1, &(0x7f00000001c0)=""/79, 0x4f, 0x0) 00:16:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) geteuid() ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x4, 0x2, 0x8a5, 0x3, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000001c0)="040547255c42360a5dc5a790da2da255", 0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e20, 0x8001, @remote={0xfe, 0x80, [], 0xbb}, 0xf22a}}, 0x100}, 0x90) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 00:16:43 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000001fc0)=ANY=[@ANYBLOB="736563597269747900000000000000000000000000000000000000000000000065fdff0f00000000"], 0x430fdafb) 00:16:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400800, 0x0) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f0000000140)) 00:16:43 executing program 0 (fault-call:5 fault-nth:14): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 529.701338] device bridge_slave_1 left promiscuous mode [ 529.707106] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.748035] device bridge_slave_0 left promiscuous mode [ 529.753734] bridge0: port 1(bridge_slave_0) entered disabled state [ 529.761472] FAULT_INJECTION: forcing a failure. [ 529.761472] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 529.773290] CPU: 1 PID: 27506 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 529.780213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.789558] Call Trace: [ 529.792152] dump_stack+0x185/0x1d0 [ 529.795781] should_fail+0x87b/0xab0 [ 529.799497] __alloc_pages_nodemask+0x600/0x5cc0 [ 529.804257] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 529.809641] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 529.815093] ? get_page_from_freelist+0xacd1/0xb7b0 [ 529.820111] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 529.825559] ? __save_stack_trace+0x90d/0xb00 [ 529.830068] kmsan_alloc_meta_for_pages+0x109/0x3b0 [ 529.835086] ? alloc_pages_vma+0xcc6/0x17f0 [ 529.839404] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 529.844590] ? shmem_getpage_gfp+0x3991/0x59c0 [ 529.849171] ? splice_direct_to_actor+0x4cb/0x1040 [ 529.854104] ? do_sendfile+0x107b/0x1e40 [ 529.858164] ? __x64_sys_sendfile64+0x218/0x390 [ 529.862834] ? do_syscall_64+0x15b/0x230 [ 529.866892] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 529.872255] ? update_curr+0x48/0x10a0 [ 529.876140] ? check_preempt_wakeup+0xbea/0x1550 [ 529.880896] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 529.886260] ? update_curr+0x107/0x10a0 [ 529.890237] ? kmsan_set_origin_inline+0x6b/0x120 [ 529.895090] kmsan_alloc_page+0x82/0xe0 [ 529.899069] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 529.903826] ? kmsan_set_origin_inline+0x6b/0x120 [ 529.908674] ? __msan_poison_alloca+0x15c/0x1d0 [ 529.913355] ? kmem_cache_alloc+0x6c7/0xb70 [ 529.917684] ? memcg_kmem_put_cache+0x40/0x290 [ 529.918434] IPVS: ftp: loaded support on port[0] = 21 [ 529.922260] ? kmem_cache_alloc+0x6c7/0xb70 [ 529.922277] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 529.922294] ? kmem_cache_alloc+0xa97/0xb70 [ 529.922312] ? __msan_metadata_ptr_for_load_8+0x10/0x20 00:16:43 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) [ 529.922323] ? __bitmap_intersects+0x173/0x300 [ 529.922346] alloc_pages_vma+0xcc6/0x17f0 [ 529.955625] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 529.960646] ? find_lock_entry+0xc8/0x720 [ 529.964809] ? find_get_entry+0x7ef/0x820 [ 529.968970] ? shmem_getpage_gfp+0x61f/0x59c0 [ 529.973470] ? shmem_getpage_gfp+0x61f/0x59c0 [ 529.977980] shmem_getpage_gfp+0x3991/0x59c0 [ 529.982393] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 529.987062] ? __wake_up_common_lock+0x10c/0x370 [ 529.991823] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 529.997280] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 530.002641] ? vmalloc_to_page+0x50b/0x630 [ 530.006883] ? _cond_resched+0x3c/0xd0 [ 530.010770] shmem_file_read_iter+0x508/0x1180 [ 530.015338] ? shmem_file_llseek+0xd80/0xd80 [ 530.019730] generic_file_splice_read+0x5d7/0x900 [ 530.024574] ? splice_shrink_spd+0x100/0x100 [ 530.028976] splice_direct_to_actor+0x4cb/0x1040 [ 530.033722] ? do_splice_direct+0x540/0x540 [ 530.038044] do_splice_direct+0x335/0x540 [ 530.042186] ? security_file_permission+0x1f0/0x480 [ 530.047193] do_sendfile+0x107b/0x1e40 [ 530.051089] __x64_sys_sendfile64+0x218/0x390 [ 530.055586] ? __ia32_sys_sendfile+0x160/0x160 [ 530.060163] do_syscall_64+0x15b/0x230 [ 530.064047] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 530.069239] RIP: 0033:0x455ab9 [ 530.072419] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 530.080110] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 530.087362] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 00:16:44 executing program 4: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000300)={0x2, 0xec, 0x3, 0x7, 0x9}) r1 = socket$netlink(0x10, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000100)) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f00000000c0)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="12"]}, 0x18}, 0x1}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xac, r2, 0x1, 0x70bd26, 0x25dfdbfe, {0x7}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x15}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000001}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8000}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1c}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x24000800}, 0x40041) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080)={0x303, 0x33}, 0x4) [ 530.094617] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 530.101871] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 530.109130] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 000000000000000e 00:16:44 executing program 1: unshare(0x64000400) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r1 = socket$inet(0x15, 0x400000080005, 0x0) bind$inet(r1, &(0x7f000001bff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f000001a000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000024fb8)}, 0x0) 00:16:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x6d, "78ed706f50d5a768d38dedcc8cfbd1d3d6189e46f906bbb9d922e1f5ee4d91cd3f5177b5071c2753798421f7008beba364a463087083c4026d478433bcf2c5c07ddf2fce7fcfce36ab73910df88a36352434192556538107c15320a3ed2ac7bab3ab28518e09424e2be9e545d1"}, &(0x7f0000000140)=0x75) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)={r2, 0x4}, &(0x7f00000001c0)=0x8) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000080)) 00:16:44 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f00000000c0)={0x3, "e6ea21"}, 0x4) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x112) recvfrom$unix(r0, &(0x7f0000000000)=""/11, 0x2000000b, 0x0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x709000) [ 530.271941] team0 (unregistering): Port device team_slave_1 removed [ 530.310767] IPVS: ftp: loaded support on port[0] = 21 [ 530.320272] team0 (unregistering): Port device team_slave_0 removed 00:16:44 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x3, &(0x7f0000000080)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x282101, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000100)={0x8, {{0xa, 0x4e22, 0x10001, @local={0xfe, 0x80, [], 0xaa}, 0x10000}}}, 0x88) fchown(r0, 0x0, 0x0) [ 530.357571] bond0 (unregistering): Releasing backup interface bond_slave_1 00:16:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:16:44 executing program 0 (fault-call:5 fault-nth:15): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 530.404510] bond0 (unregistering): Releasing backup interface bond_slave_0 00:16:44 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000001080)=""/185, 0xfffffffffffffe76, 0x0, 0x0, 0x171c073b150b2817) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00006d8fe4)=@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x2) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000040)={@multicast1, @dev}, &(0x7f0000000080)=0xc) sendto$inet6(r1, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) [ 530.540288] bond0 (unregistering): Released all slaves [ 530.577354] FAULT_INJECTION: forcing a failure. [ 530.577354] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 530.589384] CPU: 1 PID: 27545 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 530.596343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.606069] Call Trace: [ 530.608699] dump_stack+0x185/0x1d0 [ 530.612370] should_fail+0x87b/0xab0 [ 530.616157] __alloc_pages_nodemask+0x600/0x5cc0 [ 530.620966] ? kmsan_set_origin_inline+0x6b/0x120 [ 530.625856] ? __msan_poison_alloca+0x15c/0x1d0 [ 530.630563] ? kmem_cache_alloc+0x6c7/0xb70 [ 530.634924] ? memcg_kmem_put_cache+0x40/0x290 [ 530.639541] ? kmem_cache_alloc+0x6c7/0xb70 [ 530.643922] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 530.649322] ? kmem_cache_alloc+0xa97/0xb70 [ 530.653647] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 530.659023] ? __bitmap_intersects+0x173/0x300 [ 530.663632] alloc_pages_vma+0xcc6/0x17f0 [ 530.667820] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 530.672888] ? find_lock_entry+0xc8/0x720 [ 530.677067] ? find_get_entry+0x7ef/0x820 [ 530.681224] ? shmem_getpage_gfp+0x61f/0x59c0 [ 530.685746] ? shmem_getpage_gfp+0x61f/0x59c0 [ 530.690280] shmem_getpage_gfp+0x3991/0x59c0 [ 530.694702] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 530.700094] ? _cond_resched+0x3c/0xd0 [ 530.704022] shmem_file_read_iter+0x508/0x1180 [ 530.708639] ? shmem_file_llseek+0xd80/0xd80 [ 530.713073] generic_file_splice_read+0x5d7/0x900 [ 530.717970] ? splice_shrink_spd+0x100/0x100 [ 530.722424] splice_direct_to_actor+0x4cb/0x1040 [ 530.727232] ? do_splice_direct+0x540/0x540 [ 530.731629] do_splice_direct+0x335/0x540 [ 530.735843] ? security_file_permission+0x1f0/0x480 [ 530.740905] do_sendfile+0x107b/0x1e40 [ 530.744890] __x64_sys_sendfile64+0x218/0x390 [ 530.749439] ? __ia32_sys_sendfile+0x160/0x160 [ 530.754047] do_syscall_64+0x15b/0x230 [ 530.757988] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 530.763204] RIP: 0033:0x455ab9 [ 530.766411] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 530.774156] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 530.781465] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 530.788755] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 530.796059] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 530.803357] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 000000000000000f [ 531.908789] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.915196] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.922423] device bridge_slave_0 entered promiscuous mode [ 531.965872] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.972285] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.979709] device bridge_slave_1 entered promiscuous mode [ 532.020432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 532.060223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 532.239069] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 532.304900] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 532.611924] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 532.619626] team0: Port device team_slave_0 added [ 532.664205] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 532.671794] team0: Port device team_slave_1 added [ 532.727323] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 532.786688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 532.830136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 532.837424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 532.846614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 532.883608] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 532.890802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 532.899438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 533.304576] bridge0: port 2(bridge_slave_1) entered blocking state [ 533.311063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 533.317817] bridge0: port 1(bridge_slave_0) entered blocking state [ 533.324219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 533.331556] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 533.856130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 534.822509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 534.962620] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 535.101839] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 535.108158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 535.116331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 535.252572] 8021q: adding VLAN 0 to HW filter on device team0 [ 536.089326] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 536.100602] syz-executor7 cpuset=syz7 mems_allowed=0 [ 536.105795] CPU: 1 PID: 27512 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 536.112737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.122083] Call Trace: [ 536.124671] dump_stack+0x185/0x1d0 [ 536.128306] dump_header+0x2cc/0x16f0 [ 536.132102] ? __msan_poison_alloca+0x15c/0x1d0 [ 536.136789] ? oom_kill_process+0x2e0/0x2160 [ 536.141203] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 536.146656] ? ___ratelimit+0x67f/0x760 [ 536.150637] oom_kill_process+0x341/0x2160 [ 536.154885] ? mem_cgroup_scan_tasks+0x289/0x610 [ 536.159642] out_of_memory+0x1700/0x1da0 [ 536.163720] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 536.169083] ? _cond_resched+0x8b/0xd0 [ 536.173020] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 536.178218] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 536.183600] pagefault_out_of_memory+0x57/0x110 [ 536.188279] mm_fault_error+0x460/0x7c0 [ 536.192268] __do_page_fault+0x1274/0x1a10 [ 536.196508] do_page_fault+0xb7/0x250 [ 536.200305] ? page_fault+0x8/0x30 [ 536.203853] page_fault+0x1e/0x30 [ 536.207310] RIP: 0033:0x407198 [ 536.210922] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 536.216279] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 536.223538] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 536.230796] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 536.238055] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 536.245323] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 536.252679] Task in /syz7 killed as a result of limit of /syz7 [ 536.258867] memory: usage 1196kB, limit 0kB, failcnt 116 [ 536.264369] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 536.271218] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 536.277416] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 536.297284] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 536.306121] [27512] 0 27512 17553 8392 118784 0 0 syz-executor7 [ 536.315053] Memory cgroup out of memory: Kill process 27512 (syz-executor7) score 8421000 or sacrifice child [ 536.325121] Killed process 27512 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB 00:16:50 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x20, 0x400) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @broadcast=0xffffffff}], 0x10) 00:16:50 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x2000) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000240)={0x9, 0x5, 0xec5b, 0x144, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x200000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000080)={{0x0, 0x3, 0x0, 0x3, 0xfffffffffffffe55}}) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) 00:16:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = dup2(r1, r1) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e24, @multicast2=0xe0000002}, 0x10) shutdown(r0, 0x0) 00:16:50 executing program 0 (fault-call:5 fault-nth:16): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:16:50 executing program 4: r0 = semget(0x3, 0x3, 0x410) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x7) syz_emit_ethernet(0xfffffffffffffdd3, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=0x3000000, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={0xac, 0x14, 0x14, 0xaa}}}}}, &(0x7f0000000100)={0x1, 0x1, [0x0, 0x0, 0x0, 0xfffffffffffffffd]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400, 0x20) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000140)=""/154, &(0x7f00000000c0)=0x9a) 00:16:50 executing program 7: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) syslog(0xb, &(0x7f0000000080)=""/177, 0xb1) [ 536.529691] FAULT_INJECTION: forcing a failure. [ 536.529691] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 536.541519] CPU: 0 PID: 27831 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 536.548435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.557786] Call Trace: [ 536.560466] dump_stack+0x185/0x1d0 [ 536.564490] should_fail+0x87b/0xab0 [ 536.568213] __alloc_pages_nodemask+0x600/0x5cc0 [ 536.572967] ? __msan_metadata_ptr_for_load_1+0x10/0x20 00:16:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 536.578332] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 536.583782] ? get_page_from_freelist+0xacd1/0xb7b0 [ 536.588798] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 536.594242] ? __save_stack_trace+0x90d/0xb00 [ 536.598756] kmsan_alloc_meta_for_pages+0x81/0x3b0 [ 536.603686] ? alloc_pages_vma+0xcc6/0x17f0 [ 536.608011] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 536.613202] ? shmem_getpage_gfp+0x3991/0x59c0 [ 536.617788] ? splice_direct_to_actor+0x4cb/0x1040 [ 536.622726] ? do_sendfile+0x107b/0x1e40 00:16:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x0, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 536.626791] ? __x64_sys_sendfile64+0x218/0x390 [ 536.631465] ? do_syscall_64+0x15b/0x230 [ 536.635525] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 536.640886] ? update_curr+0x48/0x10a0 [ 536.644771] ? check_preempt_wakeup+0xbea/0x1550 [ 536.649525] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 536.654889] ? update_curr+0x107/0x10a0 [ 536.658863] ? kmsan_set_origin_inline+0x6b/0x120 [ 536.663712] kmsan_alloc_page+0x82/0xe0 [ 536.667694] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 536.672464] ? kmsan_set_origin_inline+0x6b/0x120 00:16:50 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)="000000137bdeb307ba62f20b92a8ad0a258a2043bc28d7cf7c309cd57dde25959f37dd649d4f0b6e554d96bfc18351b7d5e757c26d24") fchdir(r1) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000100)={0x1175, 0x9, 0x0, [{0x80, 0x401, 0x3ff, 0xb8, 0x5384, 0xff, 0x2}, {0x200, 0x5, 0xfffffffffffffffc, 0x58, 0x8c, 0xffffffffffffffff, 0xb2}, {0x0, 0x200, 0x401, 0x3, 0x4, 0x80, 0x3}, {0xff, 0x80, 0x3a8, 0x80000001, 0x8, 0xc8, 0x7f}, {0x10000, 0x80000000, 0xffffffff00000000, 0xffffffffffffff7f, 0x81, 0xa68, 0x80000000}, {0x4a9, 0x10100000000, 0x4, 0x457, 0xfffffffffffffffd, 0x5, 0x1ff}, {0x1000, 0x3, 0x7, 0x5, 0x401, 0x6, 0x40}, {0x20, 0x6, 0x40, 0x2, 0x5, 0x5, 0xffffffff}, {0x7, 0x9, 0x9, 0x0, 0x7ff, 0x0, 0x3ff}]}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x66e7e7c954e78ab6, 0x1) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000080)={r1, 0x0, 0x401, 0xffffffffffffffff, 0x8}) [ 536.677311] ? __msan_poison_alloca+0x15c/0x1d0 [ 536.681976] ? kmem_cache_alloc+0x6c7/0xb70 [ 536.686301] ? memcg_kmem_put_cache+0x40/0x290 [ 536.690887] ? kmem_cache_alloc+0x6c7/0xb70 [ 536.695209] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 536.700576] ? kmem_cache_alloc+0xa97/0xb70 [ 536.704900] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 536.710264] ? __bitmap_intersects+0x173/0x300 [ 536.714850] alloc_pages_vma+0xcc6/0x17f0 [ 536.719013] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 536.724034] ? find_lock_entry+0xc8/0x720 [ 536.728188] ? find_get_entry+0x7ef/0x820 [ 536.732339] ? shmem_getpage_gfp+0x61f/0x59c0 [ 536.736836] ? shmem_getpage_gfp+0x61f/0x59c0 [ 536.742564] shmem_getpage_gfp+0x3991/0x59c0 [ 536.746976] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 536.751646] ? __wake_up_common_lock+0x10c/0x370 [ 536.756409] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 536.761871] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 536.767238] ? vmalloc_to_page+0x50b/0x630 [ 536.771485] ? _cond_resched+0x3c/0xd0 [ 536.775381] shmem_file_read_iter+0x508/0x1180 00:16:50 executing program 4: r0 = eventfd2(0x1, 0xffffffffffffffff) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x400800) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000040)={0x6, &(0x7f0000000140)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000200)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x800, @mcast2={0xff, 0x2, [], 0x1}, 0x7ff}, @in={0x2, 0x4e20, @broadcast=0xffffffff}], 0x4c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000002480)={0x1, 0x5, 0x100020000000007, 0x2}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0xdd, &(0x7f00000000c0)}, 0x10) write$eventfd(r0, &(0x7f0000000080)=0xffffffffffffffff, 0x196) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000300)={'veth1_to_bridge\x00', 0x2}) r3 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$TIOCSBRK(r1, 0x5427) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000380)=0x0) ioprio_get$pid(0x1, r4) r5 = getpid() getsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000340), &(0x7f00000003c0)=0x10) ptrace$getenv(0x4201, r5, 0x7fff, &(0x7f00000002c0)) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000280)=r5) [ 536.779975] ? shmem_file_llseek+0xd80/0xd80 [ 536.784441] generic_file_splice_read+0x5d7/0x900 [ 536.789302] ? splice_shrink_spd+0x100/0x100 [ 536.793713] splice_direct_to_actor+0x4cb/0x1040 [ 536.798470] ? do_splice_direct+0x540/0x540 [ 536.802798] do_splice_direct+0x335/0x540 [ 536.806949] ? security_file_permission+0x1f0/0x480 [ 536.811973] do_sendfile+0x107b/0x1e40 [ 536.815871] __x64_sys_sendfile64+0x218/0x390 [ 536.820375] ? __ia32_sys_sendfile+0x160/0x160 [ 536.824960] do_syscall_64+0x15b/0x230 [ 536.828855] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 536.834042] RIP: 0033:0x455ab9 [ 536.837227] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 536.844934] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 536.852205] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 536.859476] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 536.866748] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 536.874019] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000010 00:16:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:16:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0xfffffffffffffff9, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:16:50 executing program 4: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) io_setup(0x7, &(0x7f0000000080)=0x0) r2 = eventfd2(0x3, 0x80800) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xf, 0x1, r0, &(0x7f00000000c0)="be421119c24a135d4645db393f9b967b481d7e5b3987a4afbb4927a10dde18414512a9ca1512f5c82104682c2135794906086ac0c83d97", 0x37, 0x1e87451, 0x0, 0x0, r2}, &(0x7f0000000180)) r3 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x27) rename(&(0x7f00000001c0)='./control/file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='//control\x00') close(r2) 00:16:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 537.064327] device bridge_slave_1 left promiscuous mode [ 537.070228] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.127426] device bridge_slave_0 left promiscuous mode [ 537.133286] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.177392] IPVS: ftp: loaded support on port[0] = 21 [ 537.258531] team0 (unregistering): Port device team_slave_1 removed [ 537.270985] team0 (unregistering): Port device team_slave_0 removed [ 537.284434] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 537.309621] bond0 (unregistering): Releasing backup interface bond_slave_0 00:16:51 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x5}}, [0x2, 0x5, 0x8000, 0x1, 0x4, 0x7, 0x8, 0x400, 0xb1ee, 0x0, 0x5, 0x7, 0x28, 0x1f, 0x2b4132cc]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000002c0)={r4, 0x7f, 0xffffffffffffff81}, 0x8) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000300)={r4, 0xffffffffffff8001}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000300), 0x0) shutdown(r3, 0x2) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000380)={0x7, [0x101, 0x2, 0x9, 0x400, 0x5, 0x4, 0x8]}, 0x12) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000340)=0x9, 0x4) 00:16:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 537.365743] bond0 (unregistering): Released all slaves 00:16:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x10000) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xc4012, r3, 0x0) shutdown(r1, 0x200000000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000000)='attr/exec\x00') ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f00000001c0)=""/160) getdents64(r5, &(0x7f0000000280)=""/200, 0xc8) 00:16:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x0, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:51 executing program 1: ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000000)) 00:16:51 executing program 0 (fault-call:5 fault-nth:17): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) semget(0x1, 0x4, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r2 = semget(0x1, 0x7, 0x65f) semctl$IPC_RMID(r2, 0x0, 0x0) [ 537.574923] FAULT_INJECTION: forcing a failure. [ 537.574923] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 537.586766] CPU: 0 PID: 27884 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 537.593686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.603058] Call Trace: [ 537.605650] dump_stack+0x185/0x1d0 [ 537.609285] should_fail+0x87b/0xab0 [ 537.613014] __alloc_pages_nodemask+0x600/0x5cc0 [ 537.617776] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 537.623146] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 537.628688] ? get_page_from_freelist+0xacd1/0xb7b0 [ 537.633709] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 537.639184] ? __save_stack_trace+0x90d/0xb00 [ 537.643698] kmsan_alloc_meta_for_pages+0x109/0x3b0 [ 537.648715] ? alloc_pages_vma+0xcc6/0x17f0 [ 537.653039] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 537.658234] ? shmem_getpage_gfp+0x3991/0x59c0 [ 537.662822] ? splice_direct_to_actor+0x4cb/0x1040 [ 537.667753] ? do_sendfile+0x107b/0x1e40 [ 537.671814] ? __x64_sys_sendfile64+0x218/0x390 [ 537.676483] ? do_syscall_64+0x15b/0x230 [ 537.680549] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 537.685913] ? __switch_to+0x2b3/0x420 [ 537.689803] ? switch_fpu_finish+0x6e/0x4f0 [ 537.694130] ? kmsan_set_origin_inline+0x6b/0x120 [ 537.698982] kmsan_alloc_page+0x82/0xe0 [ 537.702960] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 537.707719] ? kmsan_set_origin_inline+0x6b/0x120 [ 537.712565] ? __msan_poison_alloca+0x15c/0x1d0 [ 537.717337] ? kmem_cache_alloc+0x6c7/0xb70 [ 537.721667] ? memcg_kmem_put_cache+0x40/0x290 [ 537.726249] ? kmem_cache_alloc+0x6c7/0xb70 [ 537.730572] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 537.735940] ? kmem_cache_alloc+0xa97/0xb70 [ 537.740266] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 537.745625] ? __bitmap_intersects+0x173/0x300 [ 537.750212] alloc_pages_vma+0xcc6/0x17f0 [ 537.754371] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 537.759389] ? find_lock_entry+0xc8/0x720 [ 537.763544] ? find_get_entry+0x7ef/0x820 [ 537.767688] ? shmem_getpage_gfp+0x61f/0x59c0 [ 537.772182] ? shmem_getpage_gfp+0x61f/0x59c0 [ 537.776686] shmem_getpage_gfp+0x3991/0x59c0 [ 537.781097] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 537.785765] ? __wake_up_common_lock+0x10c/0x370 [ 537.790525] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 537.795979] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 537.801351] ? vmalloc_to_page+0x50b/0x630 [ 537.805596] ? _cond_resched+0x3c/0xd0 [ 537.809496] shmem_file_read_iter+0x508/0x1180 [ 537.814094] ? shmem_file_llseek+0xd80/0xd80 [ 537.818506] generic_file_splice_read+0x5d7/0x900 [ 537.823356] ? splice_shrink_spd+0x100/0x100 [ 537.827766] splice_direct_to_actor+0x4cb/0x1040 [ 537.832521] ? do_splice_direct+0x540/0x540 [ 537.836847] do_splice_direct+0x335/0x540 [ 537.841001] ? security_file_permission+0x1f0/0x480 [ 537.846026] do_sendfile+0x107b/0x1e40 [ 537.849930] __x64_sys_sendfile64+0x218/0x390 [ 537.854430] ? __ia32_sys_sendfile+0x160/0x160 [ 537.859014] do_syscall_64+0x15b/0x230 [ 537.862908] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 537.868091] RIP: 0033:0x455ab9 [ 537.871281] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 537.878983] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 537.886247] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 537.893513] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 537.900777] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 537.908045] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000011 [ 538.945879] bridge0: port 1(bridge_slave_0) entered blocking state [ 538.952293] bridge0: port 1(bridge_slave_0) entered disabled state [ 538.959647] device bridge_slave_0 entered promiscuous mode [ 539.000820] bridge0: port 2(bridge_slave_1) entered blocking state [ 539.007266] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.014712] device bridge_slave_1 entered promiscuous mode [ 539.055803] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 539.099229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 539.215573] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 539.258234] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 539.443668] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 539.450874] team0: Port device team_slave_0 added [ 539.489865] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 539.497131] team0: Port device team_slave_1 added [ 539.535939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 539.578131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 539.620415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 539.657128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 540.070710] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.077119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 540.083848] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.090230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 540.097769] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 540.767180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 541.595960] 8021q: adding VLAN 0 to HW filter on device bond0 [ 541.746091] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 541.886123] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 541.892331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 541.899752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 542.038402] 8021q: adding VLAN 0 to HW filter on device team0 [ 542.872769] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 542.883783] syz-executor7 cpuset=syz7 mems_allowed=0 [ 542.888998] CPU: 1 PID: 27859 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 542.895940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.905286] Call Trace: [ 542.907876] dump_stack+0x185/0x1d0 [ 542.911538] dump_header+0x2cc/0x16f0 [ 542.915332] ? __msan_poison_alloca+0x15c/0x1d0 [ 542.920015] ? oom_kill_process+0x2e0/0x2160 [ 542.924437] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 542.929893] ? ___ratelimit+0x67f/0x760 [ 542.933876] oom_kill_process+0x341/0x2160 [ 542.938107] ? mem_cgroup_scan_tasks+0x289/0x610 [ 542.942864] out_of_memory+0x1700/0x1da0 [ 542.946944] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 542.952314] ? _cond_resched+0x8b/0xd0 [ 542.956212] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 542.961411] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 542.966782] pagefault_out_of_memory+0x57/0x110 [ 542.971448] mm_fault_error+0x460/0x7c0 [ 542.975437] __do_page_fault+0x1274/0x1a10 [ 542.979674] do_page_fault+0xb7/0x250 [ 542.983478] ? page_fault+0x8/0x30 [ 542.987024] page_fault+0x1e/0x30 [ 542.990468] RIP: 0033:0x407198 [ 542.993649] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 542.999022] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 543.006282] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 543.013542] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 543.020810] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 543.028069] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 543.035800] Task in /syz7 killed as a result of limit of /syz7 [ 543.041881] memory: usage 1196kB, limit 0kB, failcnt 124 [ 543.047379] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 543.054191] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 543.060377] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 543.080211] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 543.089079] [27859] 0 27859 17553 8392 114688 0 0 syz-executor7 [ 543.097966] Memory cgroup out of memory: Kill process 27859 (syz-executor7) score 8420000 or sacrifice child [ 543.108071] Killed process 27859 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB 00:16:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x0, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:57 executing program 0 (fault-call:5 fault-nth:18): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:16:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000000)) 00:16:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000080)) 00:16:57 executing program 7: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)={0x9df, 0x20, 0x1, 0x0, 0x0, [{r1, 0x0, 0xdc4d}]}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2=0xe0000002}, 0xc) getsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000000)=""/16, &(0x7f0000000140)=0x20e) write$evdev(r0, &(0x7f00000000c0)=[{{0x77359400}, 0x6, 0x3, 0x6}, {{}, 0xfffffffffffffe00, 0x2, 0x5}], 0x30) 00:16:57 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80000) close(r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x90000001}) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 00:16:57 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x2, &(0x7f0000000140)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000000)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:16:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x3, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) [ 543.301475] FAULT_INJECTION: forcing a failure. [ 543.301475] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 543.313505] CPU: 1 PID: 28177 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 543.320457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.329828] Call Trace: [ 543.332461] dump_stack+0x185/0x1d0 [ 543.336136] should_fail+0x87b/0xab0 [ 543.339918] __alloc_pages_nodemask+0x600/0x5cc0 [ 543.344721] ? kmsan_set_origin_inline+0x6b/0x120 [ 543.349615] ? __msan_poison_alloca+0x15c/0x1d0 [ 543.354319] ? kmem_cache_alloc+0x6c7/0xb70 [ 543.358677] ? memcg_kmem_put_cache+0x40/0x290 [ 543.363291] ? kmem_cache_alloc+0x6c7/0xb70 [ 543.367659] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 543.373072] ? kmem_cache_alloc+0xa97/0xb70 [ 543.377434] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 543.382838] ? __bitmap_intersects+0x173/0x300 [ 543.387473] alloc_pages_vma+0xcc6/0x17f0 [ 543.391683] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 543.396746] ? find_lock_entry+0xc8/0x720 [ 543.400955] ? find_get_entry+0x7ef/0x820 [ 543.405148] ? shmem_getpage_gfp+0x61f/0x59c0 [ 543.409693] ? shmem_getpage_gfp+0x61f/0x59c0 [ 543.414255] shmem_getpage_gfp+0x3991/0x59c0 [ 543.418725] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 543.423437] ? __wake_up_common_lock+0x10c/0x370 [ 543.428243] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 543.433742] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 543.439160] ? vmalloc_to_page+0x50b/0x630 [ 543.443484] ? _cond_resched+0x3c/0xd0 [ 543.447439] shmem_file_read_iter+0x508/0x1180 [ 543.452080] ? shmem_file_llseek+0xd80/0xd80 [ 543.456537] generic_file_splice_read+0x5d7/0x900 [ 543.461441] ? splice_shrink_spd+0x100/0x100 [ 543.465898] splice_direct_to_actor+0x4cb/0x1040 [ 543.470701] ? do_splice_direct+0x540/0x540 [ 543.475096] do_splice_direct+0x335/0x540 [ 543.479331] ? security_file_permission+0x1f0/0x480 [ 543.484391] do_sendfile+0x107b/0x1e40 [ 543.488357] __x64_sys_sendfile64+0x218/0x390 [ 543.492890] ? __ia32_sys_sendfile+0x160/0x160 [ 543.497522] do_syscall_64+0x15b/0x230 [ 543.501454] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 543.506662] RIP: 0033:0x455ab9 [ 543.509863] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 543.517603] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 543.524989] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 543.532279] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 543.539570] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 00:16:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x1, &(0x7f0000000040)={0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x6d1f8000, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x4, {0x2, 0x100000001, "1a4f87e6d0a70c763cfcbe8a228389632f21c11e242f51c83d8e1332e9b2030d5e7b812c9492576579609aa651259ed232f814c80bcac7254f78534debd4cb57441d1d840c24be8f952c68aa4e3f62137ca81fb85b1145236070101418faa7808a564770ccac1e2d1be10138ebc5973617b9896082c68969a4a75678a138bf15fc2e5a86395aa572ae20603bcc9ceb31a1abbab45ca3c3a95bda2a06bc9cc943029da96efe24625d2c28fe4a6aa05334cba6f67cf088c3f20126d6777640b09c78990024cda86731c6478ca8a696e1cf3ee3b81b463a982286987eb82cc2abc93e792a166dca67989dc066ffd56faf9b71719b82963a16d32fba2c2bc2735701", 0x16, 0x40000000000000, 0xc322, 0x1, 0x601e, 0x1, 0x6}, r4}}, 0x128) shutdown(r0, 0x0) 00:16:57 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) getsockopt$inet6_int(r2, 0x29, 0x13, &(0x7f0000000380), &(0x7f00000003c0)=0x4) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x20000000000001b1, &(0x7f0000000080)={r4}, &(0x7f00000000c0), 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e20, 0x5, @empty, 0x2}}, 0x7b93, 0x40, 0x80, 0x6, 0x34}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000300)={r5, 0x5}, &(0x7f0000000340)=0x8) get_mempolicy(&(0x7f0000000000), &(0x7f0000000140), 0x1b1, &(0x7f0000ffc000/0x3000)=nil, 0x2) shutdown(r0, 0x2) 00:16:57 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 543.546861] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000012 [ 543.563287] IPVS: ftp: loaded support on port[0] = 21 00:16:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:16:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:16:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x6) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400060000000000ffffffff0000000000000000142f1f00e0a6a7ce0200fe8000000000000000005e74ca91179d3bbb5f09a0ab655f6eab9dd87fab91577d7b4ec9a3551ac996a03f2614f7c9a862e6e348fd3fb4e512db37b6655bccacc235dac0a0f39a7b33266f51b1705739e407"], 0x40}, 0x1}, 0x0) [ 543.736363] device bridge_slave_1 left promiscuous mode [ 543.742159] bridge0: port 2(bridge_slave_1) entered disabled state 00:16:57 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0xd}, 0x4}, r3}}, 0x38) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r4}, &(0x7f00000000c0), 0x8) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000140)=0x3, 0x4) shutdown(r5, 0x0) 00:16:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000140)) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000000)) [ 543.820889] device bridge_slave_0 left promiscuous mode [ 543.826647] bridge0: port 1(bridge_slave_0) entered disabled state 00:16:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000200)={{r2, r3+10000000}, {r4, r5+10000000}}, &(0x7f0000000240)) [ 543.975756] team0 (unregistering): Port device team_slave_1 removed [ 544.021647] team0 (unregistering): Port device team_slave_0 removed [ 544.043338] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 544.063853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 544.099494] bond0 (unregistering): Released all slaves [ 544.127254] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. [ 544.153995] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. [ 545.169177] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.175603] bridge0: port 1(bridge_slave_0) entered disabled state [ 545.182922] device bridge_slave_0 entered promiscuous mode [ 545.223237] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.229632] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.236860] device bridge_slave_1 entered promiscuous mode [ 545.276391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 545.316119] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 545.429510] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 545.472297] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 545.661643] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 545.669128] team0: Port device team_slave_0 added [ 545.709059] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 545.716436] team0: Port device team_slave_1 added [ 545.756857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 545.799951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 545.842345] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 545.849519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 545.858632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 545.894372] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 545.901613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 545.910717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 546.308634] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.315060] bridge0: port 2(bridge_slave_1) entered forwarding state [ 546.321796] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.328197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 546.336139] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 547.231178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 547.901307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 548.044568] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 548.188453] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 548.194652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 548.202745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 548.339471] 8021q: adding VLAN 0 to HW filter on device team0 [ 549.175869] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 549.186923] syz-executor7 cpuset=syz7 mems_allowed=0 [ 549.192176] CPU: 1 PID: 28185 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 549.199115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.208491] Call Trace: [ 549.211084] dump_stack+0x185/0x1d0 [ 549.214708] dump_header+0x2cc/0x16f0 [ 549.218501] ? __msan_poison_alloca+0x15c/0x1d0 [ 549.223171] ? oom_kill_process+0x2e0/0x2160 [ 549.227583] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 549.233041] ? ___ratelimit+0x67f/0x760 [ 549.237036] oom_kill_process+0x341/0x2160 [ 549.241269] ? mem_cgroup_scan_tasks+0x289/0x610 [ 549.246034] out_of_memory+0x1700/0x1da0 [ 549.250099] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 549.255459] ? _cond_resched+0x8b/0xd0 [ 549.259361] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 549.264558] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 549.269939] pagefault_out_of_memory+0x57/0x110 [ 549.274611] mm_fault_error+0x460/0x7c0 [ 549.278614] __do_page_fault+0x1274/0x1a10 [ 549.282852] do_page_fault+0xb7/0x250 [ 549.286647] ? page_fault+0x8/0x30 [ 549.290178] page_fault+0x1e/0x30 [ 549.293621] RIP: 0033:0x407198 [ 549.296798] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 549.302153] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 549.309411] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 549.316668] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 549.323929] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 549.331194] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 549.338670] Task in /syz7 killed as a result of limit of /syz7 [ 549.344877] memory: usage 1196kB, limit 0kB, failcnt 132 [ 549.350392] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 549.357204] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 549.363397] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 549.383236] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 549.392106] [28185] 0 28185 17553 8392 114688 0 0 syz-executor7 [ 549.401066] Memory cgroup out of memory: Kill process 28185 (syz-executor7) score 8420000 or sacrifice child [ 549.411134] Killed process 28185 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB [ 549.442498] oom_reaper: reaped process 28185 (syz-executor7), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB 00:17:03 executing program 7: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x2) unshare(0x24020400) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="000011000000000000000000"]) 00:17:03 executing program 5: socketpair(0x1b, 0x3, 0x9, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000080)=0x3) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000001240)=ANY=[@ANYBLOB="66696c74657200fffbffff00000000000000000000000000000000000000000014000000c052538299285390f9970144f004d7d78e873123"], &(0x7f0000001300)=0x1) syz_open_dev$vcsn(&(0x7f00000012c0)='/dev/vcs#\x00', 0x8, 0x200) readv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/215, 0xd7}, {&(0x7f00000001c0)=""/54, 0x36}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x3) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x7, 0x4) 00:17:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:17:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x800) setsockopt$inet_dccp_buf(r1, 0x21, 0xcc, &(0x7f0000000280)="c1cd34c3ecfca61ac71fb51ed47d6ff587f6254c283a0de88fc52f4ed75842871083603287799f3d677662d4ca2aa6bd49d5450d76326e8b500a0f68ee39c438e0d5322ec091e61446b2f276f1e290d87fdb20b06313ece8f195061539157cab3c85bdeb95ace0615ba378b9fff1ecfc247a903f162922e73b502e10d88fe137f655128b832c345e0788c7b05c068a2adea1317a118ab7c34ce87dbdffdbc465f93b41b4e1ac130629c160d09e46ee367e52aca49e29d8163a7a47c3aeebeee7aac1366be4f4b5f7e50036ccd82451587409a33087", 0xd5) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x2, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x1af) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000640)={0x4, {{0x2, 0xfffffffffffffffe, @multicast2=0xe0000002}}}, 0x88) r2 = socket(0x10, 0x80002, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r4 = getpgid(r3) ioctl$sock_SIOCGIFCONF(r2, 0x8910, &(0x7f0000000140)=@req={0x28, &(0x7f0000000100)={'bcsh0\x00', @ifru_settings={0x8, 0x7, @cisco=&(0x7f00000000c0)={0x173, 0x7}}}}) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioprio_get$pid(0x0, r3) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000012ffc)=0x90) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000580)=""/136) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000440)={{0x7, 0x3, 0x3, 0x9, 'syz1\x00', 0x1}, 0x3, 0x0, 0xac, r4, 0x9, 0x4, 'syz0\x00', &(0x7f0000000380)=[',]\\eth0md5sum{]-\'bdev\'\x00', 'security%\x00', '/dev/input/mice\x00', '\x00', '/dev/input/mice\x00', '/dev/input/mice\x00', 'selinux&#$)*)ppp0vmnet1cgroup%(mime_type\x00', '/dev/input/mice\x00', '/dev/input/mice\x00'], 0x9b, [], [0x3, 0xad, 0x9, 0x9]}) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 00:17:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000, 0x4a) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f0000000140)) 00:17:03 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) shutdown(r1, 0x1) 00:17:03 executing program 0 (fault-call:5 fault-nth:19): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:17:03 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20100, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000100)) semget(0x3, 0x2, 0x80) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f00000000c0)=0x5, 0x4) [ 549.618233] device bridge_slave_1 left promiscuous mode [ 549.623958] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.683831] device bridge_slave_0 left promiscuous mode [ 549.689645] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.740351] FAULT_INJECTION: forcing a failure. [ 549.740351] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 549.752199] CPU: 0 PID: 28500 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 549.759211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.768559] Call Trace: [ 549.771155] dump_stack+0x185/0x1d0 [ 549.774792] should_fail+0x87b/0xab0 [ 549.778519] __alloc_pages_nodemask+0x600/0x5cc0 [ 549.783284] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 549.788658] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 549.794105] ? get_page_from_freelist+0xacd1/0xb7b0 [ 549.799128] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 549.804576] ? __save_stack_trace+0x90d/0xb00 [ 549.809092] kmsan_alloc_meta_for_pages+0x81/0x3b0 [ 549.814025] ? alloc_pages_vma+0xcc6/0x17f0 [ 549.818350] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 549.823535] ? shmem_getpage_gfp+0x3991/0x59c0 [ 549.828123] ? splice_direct_to_actor+0x4cb/0x1040 [ 549.833055] ? do_sendfile+0x107b/0x1e40 [ 549.837120] ? __x64_sys_sendfile64+0x218/0x390 [ 549.841786] ? do_syscall_64+0x15b/0x230 [ 549.845853] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 549.851223] ? __msan_poison_alloca+0x15c/0x1d0 [ 549.855897] ? kmsan_set_origin_inline+0x6b/0x120 [ 549.860743] kmsan_alloc_page+0x82/0xe0 [ 549.864720] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 549.869476] ? kmsan_set_origin_inline+0x6b/0x120 [ 549.874316] ? __msan_poison_alloca+0x15c/0x1d0 [ 549.878983] ? kmem_cache_alloc+0x6c7/0xb70 [ 549.883313] ? memcg_kmem_put_cache+0x40/0x290 [ 549.887894] ? kmem_cache_alloc+0x6c7/0xb70 [ 549.892222] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 549.897583] ? kmem_cache_alloc+0xa97/0xb70 [ 549.901906] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 549.907265] ? __bitmap_intersects+0x173/0x300 [ 549.911855] alloc_pages_vma+0xcc6/0x17f0 [ 549.916016] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 549.921039] ? find_lock_entry+0xc8/0x720 [ 549.925188] ? find_get_entry+0x7ef/0x820 [ 549.929332] ? shmem_getpage_gfp+0x61f/0x59c0 [ 549.933828] ? shmem_getpage_gfp+0x61f/0x59c0 [ 549.938328] shmem_getpage_gfp+0x3991/0x59c0 [ 549.942745] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 549.948111] ? __list_add_valid+0xb8/0x450 [ 549.952347] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 549.957796] ? pick_next_task_fair+0x22c9/0x2530 [ 549.962579] ? _cond_resched+0x3c/0xd0 [ 549.966477] shmem_file_read_iter+0x508/0x1180 [ 549.971070] ? shmem_file_llseek+0xd80/0xd80 [ 549.975484] generic_file_splice_read+0x5d7/0x900 [ 549.980335] ? splice_shrink_spd+0x100/0x100 [ 549.984748] splice_direct_to_actor+0x4cb/0x1040 [ 549.989502] ? do_splice_direct+0x540/0x540 [ 549.993831] do_splice_direct+0x335/0x540 [ 549.997978] ? security_file_permission+0x1f0/0x480 [ 550.002999] do_sendfile+0x107b/0x1e40 [ 550.006900] __x64_sys_sendfile64+0x218/0x390 [ 550.011406] ? __ia32_sys_sendfile+0x160/0x160 [ 550.015989] do_syscall_64+0x15b/0x230 [ 550.019880] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 550.025059] RIP: 0033:0x455ab9 [ 550.028244] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 550.035946] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 550.043212] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 550.050477] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 550.057744] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 550.065011] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000013 00:17:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000000)=0x3) syz_open_pts(r0, 0x210040) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5a0bcb89, 0x10000) setsockopt$inet6_udp_int(r1, 0x11, 0x6f, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 00:17:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$KDMKTONE(r0, 0x4b30, 0x40) socketpair(0x0, 0xf, 0x2, &(0x7f0000002440)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f0000002480)={@multicast2, @dev, @multicast1}, &(0x7f00000024c0)=0xc) [ 550.209626] team0 (unregistering): Port device team_slave_1 removed [ 550.286546] team0 (unregistering): Port device team_slave_0 removed [ 550.342600] bond0 (unregistering): Releasing backup interface bond_slave_1 00:17:04 executing program 0 (fault-call:5 fault-nth:20): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 550.389956] bond0 (unregistering): Releasing backup interface bond_slave_0 00:17:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x2000, 0x1) r1 = accept4$inet(r0, &(0x7f00000004c0)={0x0, 0x0, @loopback}, &(0x7f0000000500)=0x10, 0x80800) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x81) r3 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000019c0)={{{@in=@rand_addr, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) r5 = getegid() r6 = fcntl$getown(r2, 0x9) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001b00)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000001c00)=0xe8) lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) rt_sigsuspend(&(0x7f00000000c0), 0xffffff10) r9 = getpid() getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000020c0)={0x0, 0x2}, &(0x7f0000002100)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000002140)={r10, @in={{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x6, 0xd4d}, 0xffd7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001d00)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@mcast2}}, &(0x7f0000001e00)=0xe8) r12 = getgid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001e40)=0x0) r14 = geteuid() stat(&(0x7f0000001e80)='./file0/file0\x00', &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r2, &(0x7f0000002080)={&(0x7f0000000540)=@abs={0x8fd0af225c0465c1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001940)=[{&(0x7f00000005c0)="ec245741f845b3b2c207bad8e8faaa3cce8d82067c2d5b3dc2b48ca977f6731eefd04d13b4244b30f23f089a4a902c053d297b2d1a58af515fa943696c7f5c15c2c5a490efe5e9f1d33e7efadea8d11b64b27a4f48053ef1d0a20cd68bf7922c6348f5e9bf2910a1", 0x68}, {&(0x7f0000000640)="855dd56743b547d0760c6e63c89b4a5ae025bd944cd55afdfdd1cd4f82149f38dd8322b88d114dafc5668f1b0d04f91aebfda224f3a7b55b7e557fa7dea745cf7c74ed9b9558fa027a57913bb0712457b86cff0c5d216285cc99b1b4be56db98a443331e9f795c4f5638913fc23369a69985ace4fd3dd953925485e46fc1f0b31c045b86d60d8685b830c93ff1113a", 0x8f}, {&(0x7f0000000700)="556036ee1592340810d631aaf08ecc18b2df60f8886602f4ab857bdd59421f251d43df614c3f89e34ea14e622bcace2886521e66e91fb53e06c4f97df8030bf7eb82577bc571dd5cb7c9dc9659ba6e1481f299976986df55dbbe49d0fd2e351b3758ff04c87e2fdfdabba78ddd0c581e1528ee3162d8253f992e9dc7da7d10d32f431884eeace942ab6a2afc1b09e38b7ee4098b", 0x94}, {&(0x7f00000007c0)="1c3c4724c743366e8f4ab35616e6cba10efed4f8d98a959e7f0eb8b207e657a02cac764444aac3bf252395fc6d10ee73dd8e096b58cb72cd25e15dc8718d71939d70a937c857de9f01d148d74f", 0x4d}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="5b47424cd251696dd700ae6956fcfde9ded867d750d022d0db3d7b3c7d0149247b6f08249541f915763b10c6b6858d98322160b586535af0c117cb295805a3a2e08f5353996c0f7fa970e719bc4d89e5430b7355a4d13c02934cf53fc6a96fbb8d58a00eb6b4ad07c8abcf88382c445ef813b2b20fbd1516c5b6604cd77e9b545a442e4bc4d3fe3f1b478415af82d78427289b577a2fe8d1f7ab1557550ba01d04d445da0228a375a1b37ad29141ef1132f9c6ae3d725ac019efbc8cfe6a082787", 0xc1}], 0x6, &(0x7f0000001f40)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x38, 0x1, 0x1, [r2, r0, r2, r2, r2, r2, r0, r0, r0, r1]}, @rights={0x28, 0x1, 0x1, [r0, r2, r2, r2, r2, r0]}, @cred={0x20, 0x1, 0x2, r9, r11, r12}, @rights={0x18, 0x1, 0x1, [r2]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r2, r0]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x140, 0x4}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000003c0)={0xffffffff}, 0x13f, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000440)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), r16, 0x2}}, 0x18) r17 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r17, 0x5404, &(0x7f0000000140)={0x2, 0xfffffffffffffffb, 0x7fffffff, 0x0, 0x2800, 0x5, 0x1df, 0x2, 0x2, 0x8000, 0x2, 0xbd45015}) r18 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x9, 0x200) getsockopt$inet_sctp_SCTP_MAX_BURST(r18, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$TIOCGSOFTCAR(r17, 0x5419, &(0x7f0000000000)) 00:17:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x10001, 0x20000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f00000000c0)={{0x8, 0xffffffffcaff8819}, 'port0\x00', 0x21, 0x100000, 0x5, 0xfffffffffffffffa, 0x4, 0x873, 0x38, 0x0, 0x7, 0x6}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0xc01, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x7f) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000280)=@assoc_value, &(0x7f00000002c0)=0x8) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x9d25, 0x2) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000340)) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000300)) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000200)) setsockopt$inet_dccp_buf(r1, 0x21, 0x0, &(0x7f0000000180)="5fe18f55c5d80fe7a091bbffef335fbf06ab72028380d64998a71515f7dad554885fc471d870349ac8d232cc8c08bda811611198152d9f89", 0x38) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f00000001c0)) [ 550.484845] IPVS: ftp: loaded support on port[0] = 21 [ 550.531998] bond0 (unregistering): Released all slaves [ 550.562301] FAULT_INJECTION: forcing a failure. [ 550.562301] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 550.574602] CPU: 0 PID: 28528 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 550.581525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.590874] Call Trace: [ 550.593476] dump_stack+0x185/0x1d0 [ 550.597115] should_fail+0x87b/0xab0 [ 550.600842] __alloc_pages_nodemask+0x600/0x5cc0 [ 550.605606] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 550.610981] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 550.616436] ? get_page_from_freelist+0xacd1/0xb7b0 [ 550.621469] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 550.626921] ? __save_stack_trace+0x90d/0xb00 [ 550.631527] kmsan_alloc_meta_for_pages+0x109/0x3b0 [ 550.636545] ? alloc_pages_vma+0xcc6/0x17f0 [ 550.640867] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 550.646055] ? shmem_getpage_gfp+0x3991/0x59c0 [ 550.650639] ? splice_direct_to_actor+0x4cb/0x1040 [ 550.655574] ? do_sendfile+0x107b/0x1e40 [ 550.659636] ? __x64_sys_sendfile64+0x218/0x390 [ 550.664302] ? do_syscall_64+0x15b/0x230 [ 550.668368] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 550.673732] ? __msan_poison_alloca+0x15c/0x1d0 [ 550.678412] ? kmsan_set_origin_inline+0x6b/0x120 [ 550.683261] kmsan_alloc_page+0x82/0xe0 [ 550.687238] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 550.691997] ? kmsan_set_origin_inline+0x6b/0x120 [ 550.696843] ? __msan_poison_alloca+0x15c/0x1d0 [ 550.701514] ? kmem_cache_alloc+0x6c7/0xb70 [ 550.705843] ? memcg_kmem_put_cache+0x40/0x290 [ 550.710425] ? kmem_cache_alloc+0x6c7/0xb70 [ 550.714754] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 550.720120] ? kmem_cache_alloc+0xa97/0xb70 [ 550.724452] ? __msan_metadata_ptr_for_load_8+0x10/0x20 00:17:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000000c0)={0x3, 0x3ff, 0x1, 0x25ad, 0x464, 0x1000, 0x7, 0x100, 0x7ff}) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000040)) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:17:04 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e22, 0x0, @empty, 0x101}}, 0x4, 0x81, 0x0, 0x1, 0x80}, 0x98) [ 550.729814] ? __bitmap_intersects+0x173/0x300 [ 550.734399] alloc_pages_vma+0xcc6/0x17f0 [ 550.738558] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 550.743590] ? find_lock_entry+0xc8/0x720 [ 550.747742] ? find_get_entry+0x7ef/0x820 [ 550.751901] ? shmem_getpage_gfp+0x61f/0x59c0 [ 550.756400] ? shmem_getpage_gfp+0x61f/0x59c0 [ 550.760906] shmem_getpage_gfp+0x3991/0x59c0 [ 550.765319] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 550.769985] ? __wake_up_common_lock+0x10c/0x370 [ 550.774747] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 550.780213] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 550.785591] ? vmalloc_to_page+0x50b/0x630 [ 550.789838] ? _cond_resched+0x3c/0xd0 [ 550.793736] shmem_file_read_iter+0x508/0x1180 [ 550.798335] ? shmem_file_llseek+0xd80/0xd80 [ 550.802747] generic_file_splice_read+0x5d7/0x900 [ 550.807600] ? splice_shrink_spd+0x100/0x100 [ 550.812013] splice_direct_to_actor+0x4cb/0x1040 [ 550.816768] ? do_splice_direct+0x540/0x540 [ 550.821105] do_splice_direct+0x335/0x540 [ 550.825254] ? security_file_permission+0x1f0/0x480 00:17:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000140)) mmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x5, 0x12, r0, 0x0) r1 = getpgrp(0x0) ioprio_set$pid(0x2, r1, 0x5) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) [ 550.830274] do_sendfile+0x107b/0x1e40 [ 550.834172] __x64_sys_sendfile64+0x218/0x390 [ 550.838672] ? __ia32_sys_sendfile+0x160/0x160 [ 550.843264] do_syscall_64+0x15b/0x230 [ 550.847157] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 550.852343] RIP: 0033:0x455ab9 [ 550.855535] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 550.863251] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 550.870519] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 550.877785] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 550.885053] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 550.892315] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000014 [ 551.964541] bridge0: port 1(bridge_slave_0) entered blocking state [ 551.970956] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.978354] device bridge_slave_0 entered promiscuous mode [ 552.017867] bridge0: port 2(bridge_slave_1) entered blocking state [ 552.024247] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.031549] device bridge_slave_1 entered promiscuous mode [ 552.070789] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 552.110137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 552.222142] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 552.264422] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 552.446744] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 552.453970] team0: Port device team_slave_0 added [ 552.494820] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 552.502133] team0: Port device team_slave_1 added [ 552.542571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 552.586534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 552.628388] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 552.635636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 552.644118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 552.682554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 553.088068] bridge0: port 2(bridge_slave_1) entered blocking state [ 553.094477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 553.101230] bridge0: port 1(bridge_slave_0) entered blocking state [ 553.107617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 553.115193] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 553.951198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 554.595951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 554.739059] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 554.881461] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 554.887666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 554.896302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 555.031995] 8021q: adding VLAN 0 to HW filter on device team0 [ 555.875871] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 555.886933] syz-executor7 cpuset=syz7 mems_allowed=0 [ 555.892192] CPU: 1 PID: 28518 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 555.899142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.908508] Call Trace: [ 555.911105] dump_stack+0x185/0x1d0 [ 555.914731] dump_header+0x2cc/0x16f0 [ 555.918526] ? __msan_poison_alloca+0x15c/0x1d0 [ 555.923195] ? oom_kill_process+0x2e0/0x2160 [ 555.927604] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 555.933064] ? ___ratelimit+0x67f/0x760 [ 555.937049] oom_kill_process+0x341/0x2160 [ 555.941280] ? mem_cgroup_scan_tasks+0x289/0x610 [ 555.946042] out_of_memory+0x1700/0x1da0 [ 555.950109] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 555.955468] ? _cond_resched+0x8b/0xd0 [ 555.959366] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 555.964550] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 555.969925] pagefault_out_of_memory+0x57/0x110 [ 555.974595] mm_fault_error+0x460/0x7c0 [ 555.978604] __do_page_fault+0x1274/0x1a10 [ 555.982852] do_page_fault+0xb7/0x250 [ 555.986644] ? page_fault+0x8/0x30 [ 555.990177] page_fault+0x1e/0x30 [ 555.993619] RIP: 0033:0x407198 [ 555.996795] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 556.002149] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 556.009417] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 556.016675] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 556.023933] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 556.031207] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 556.038672] Task in /syz7 killed as a result of limit of /syz7 [ 556.044870] memory: usage 1196kB, limit 0kB, failcnt 140 [ 556.050390] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 556.057226] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 556.063439] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 556.083284] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 556.092137] [28518] 0 28518 17553 8391 114688 0 0 syz-executor7 [ 556.101072] Memory cgroup out of memory: Kill process 28518 (syz-executor7) score 8419000 or sacrifice child [ 556.111150] Killed process 28518 (syz-executor7) total-vm:70212kB, anon-rss:76kB, file-rss:33488kB, shmem-rss:0kB 00:17:10 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80000, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) 00:17:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000280)=@buf={0x34, &(0x7f0000000240)="7093eca99d8aee9f5d777c12e612c92bd70c41626004c53c683a72d010b23b1dfb942f74a13f1b7a811ed8fe6495d236ab231f7f"}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) fcntl$notify(r0, 0x402, 0x1) ppoll(&(0x7f00000002c0)=[{r1, 0x8000}, {r1, 0x4000}, {r1, 0x210}, {r1, 0x440}, {r1, 0x8000}, {r0, 0x10}, {r1, 0x4000}, {r0, 0x108}, {r1, 0x100}], 0x9, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000140)={0x1}, 0x8) shutdown(r0, 0x0) 00:17:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TIOCCBRK(r0, 0x5428) 00:17:10 executing program 4: unshare(0x2000400) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) accept$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "cfab04f82a888f209c6aeb88b669a1a7469676db8f175db4820a190b9ee5935b96c3b4f27e5846df8d182918"}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x103000, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000140)=0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x4040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000002c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9473b695d3b1090002f5", @ANYRES16=r4, @ANYBLOB="000429bd7000fedbdf25020000000800020002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) 00:17:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:17:10 executing program 0 (fault-call:5 fault-nth:21): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:17:10 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000140)=[{r0}, {r0}], 0x203, &(0x7f0000000080)={r1}, &(0x7f0000000000)={0x100000000}, 0x8) shutdown(r0, 0x2) 00:17:10 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) unshare(0x2000400) inotify_init1(0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000a65ff8), 0x8}) [ 556.303689] FAULT_INJECTION: forcing a failure. [ 556.303689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 556.315720] CPU: 0 PID: 28820 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 556.322672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.332047] Call Trace: [ 556.334681] dump_stack+0x185/0x1d0 [ 556.338358] should_fail+0x87b/0xab0 [ 556.342144] __alloc_pages_nodemask+0x600/0x5cc0 [ 556.346948] ? kmsan_set_origin_inline+0x6b/0x120 [ 556.351845] ? __msan_poison_alloca+0x15c/0x1d0 [ 556.356635] ? kmem_cache_alloc+0x6c7/0xb70 [ 556.361001] ? memcg_kmem_put_cache+0x40/0x290 [ 556.365617] ? kmem_cache_alloc+0x6c7/0xb70 [ 556.369996] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 556.375418] ? kmem_cache_alloc+0xa97/0xb70 [ 556.379798] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 556.385189] ? __bitmap_intersects+0x173/0x300 [ 556.389827] alloc_pages_vma+0xcc6/0x17f0 [ 556.394043] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 556.399125] ? find_lock_entry+0xc8/0x720 00:17:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x80, 0x0) r1 = getpid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000fb9fc8)={&(0x7f00008ee000)={0x10}, 0xc, &(0x7f0000fe8000)={&(0x7f0000000140)=ANY=[@ANYBLOB="380100001a00090a0000000000000000ac1400844a650e66988bf316c5986a00000000000000000000000000ac14ffaa00000000000000000000000000000000733f3a5d21db5c11f766e1e0eb1edd76efea6a2bde918014275ff0970d42abbedeb4c6e739d78f7bd4a9825a112fe5b76d2552dbe1eeac11f221454516d5a04bc482d6a14dda8e89b95e03d14084e63dd1ef9c539083796f3c2c6ef9", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff010000000000000000000000000001000000003c000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480002006c72772d73657270656e742d6176783200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x138}, 0x1}, 0x0) [ 556.403330] ? find_get_entry+0x7ef/0x820 [ 556.407529] ? shmem_getpage_gfp+0x61f/0x59c0 [ 556.412080] ? shmem_getpage_gfp+0x61f/0x59c0 [ 556.416647] shmem_getpage_gfp+0x3991/0x59c0 [ 556.421117] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 556.426529] ? __list_add_valid+0xb8/0x450 [ 556.430819] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 556.436323] ? pick_next_task_fair+0x22c9/0x2530 [ 556.441182] shmem_file_read_iter+0x508/0x1180 [ 556.445825] ? shmem_file_llseek+0xd80/0xd80 [ 556.450289] generic_file_splice_read+0x5d7/0x900 [ 556.455199] ? splice_shrink_spd+0x100/0x100 [ 556.459666] splice_direct_to_actor+0x4cb/0x1040 [ 556.464478] ? do_splice_direct+0x540/0x540 [ 556.468871] do_splice_direct+0x335/0x540 [ 556.473086] ? security_file_permission+0x1f0/0x480 [ 556.478180] do_sendfile+0x107b/0x1e40 [ 556.482188] __x64_sys_sendfile64+0x218/0x390 [ 556.485379] netlink: 72 bytes leftover after parsing attributes in process `syz-executor4'. [ 556.486739] ? __ia32_sys_sendfile+0x160/0x160 [ 556.486768] do_syscall_64+0x15b/0x230 [ 556.486810] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 556.486831] RIP: 0033:0x455ab9 [ 556.486847] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 556.486878] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 556.486904] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 556.518283] netlink: 72 bytes leftover after parsing attributes in process `syz-executor4'. [ 556.519939] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 556.519957] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 556.519974] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000015 00:17:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @multicast2=0xe0000002}}, 0x9, 0x2312}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)={r2, 0x85f}, &(0x7f00000001c0)=0x8) 00:17:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) 00:17:10 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x46, 0x400) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f00000001c0)=0x1e) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x2) 00:17:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x0, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 556.678908] device bridge_slave_1 left promiscuous mode [ 556.684796] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.727713] device bridge_slave_0 left promiscuous mode [ 556.733407] bridge0: port 1(bridge_slave_0) entered disabled state 00:17:10 executing program 0 (fault-call:5 fault-nth:22): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:17:10 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)="b5f614be5bb294839903a82c6602f1d007b49f91c6bd02c5e59872959d8d292195264001dd1c64d7cef6045921af1fad5b1c7e4132715a53be6d", &(0x7f0000000200)=""/4096}, 0x18) unshare(0x10040000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000180)) 00:17:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000080)={0x1000, 0x2, 0x7, 0x5, 0x2, 0xe4d}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0xc000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x8400) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='/dev/ptmx\x00') fgetxattr(r1, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f00000001c0)=""/217, 0xd9) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000180)) fallocate(r2, 0x10, 0x3, 0x5) [ 556.874497] team0 (unregistering): Port device team_slave_1 removed [ 556.913993] team0 (unregistering): Port device team_slave_0 removed [ 556.955936] bond0 (unregistering): Releasing backup interface bond_slave_1 00:17:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x780, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xcac, 0x0) readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) ppoll(&(0x7f0000001200)=[{r2, 0x10}, {r1, 0x1000}], 0x2, &(0x7f0000001280)={r3, r4+30000000}, &(0x7f00000012c0)={0x4}, 0x8) inotify_add_watch(r2, &(0x7f0000001340)='./file0\x00', 0x7ffffffd) keyctl$session_to_parent(0x12) [ 557.008886] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 557.070136] FAULT_INJECTION: forcing a failure. [ 557.070136] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 557.081987] CPU: 1 PID: 28863 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 557.088913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.098270] Call Trace: [ 557.100865] dump_stack+0x185/0x1d0 [ 557.104509] should_fail+0x87b/0xab0 [ 557.108240] __alloc_pages_nodemask+0x600/0x5cc0 [ 557.113004] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 557.118373] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 557.123823] ? get_page_from_freelist+0xacd1/0xb7b0 [ 557.128841] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 557.134292] ? __save_stack_trace+0x90d/0xb00 [ 557.138802] kmsan_alloc_meta_for_pages+0x81/0x3b0 [ 557.143730] ? alloc_pages_vma+0xcc6/0x17f0 [ 557.148052] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 557.153237] ? shmem_getpage_gfp+0x3991/0x59c0 [ 557.157827] ? splice_direct_to_actor+0x4cb/0x1040 [ 557.162754] ? do_sendfile+0x107b/0x1e40 [ 557.166813] ? __x64_sys_sendfile64+0x218/0x390 [ 557.171479] ? do_syscall_64+0x15b/0x230 [ 557.173708] bond0 (unregistering): Released all slaves [ 557.175541] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 557.175557] ? __msan_poison_alloca+0x15c/0x1d0 [ 557.175576] ? kmsan_set_origin_inline+0x6b/0x120 [ 557.175598] kmsan_alloc_page+0x82/0xe0 [ 557.175615] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 557.175629] ? kmsan_set_origin_inline+0x6b/0x120 [ 557.175642] ? __msan_poison_alloca+0x15c/0x1d0 [ 557.175656] ? kmem_cache_alloc+0x6c7/0xb70 [ 557.175673] ? memcg_kmem_put_cache+0x40/0x290 [ 557.175684] ? kmem_cache_alloc+0x6c7/0xb70 [ 557.175697] ? kmsan_set_origin_inline+0x6b/0x120 [ 557.175724] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 557.202497] IPVS: ftp: loaded support on port[0] = 21 [ 557.204519] ? __bitmap_intersects+0x173/0x300 [ 557.204539] alloc_pages_vma+0xcc6/0x17f0 [ 557.204564] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 557.204581] ? find_lock_entry+0xc8/0x720 [ 557.204596] ? find_get_entry+0x7ef/0x820 [ 557.204610] ? shmem_getpage_gfp+0x61f/0x59c0 [ 557.204624] ? shmem_getpage_gfp+0x61f/0x59c0 [ 557.204645] shmem_getpage_gfp+0x3991/0x59c0 [ 557.204660] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 557.204675] ? pick_next_entity+0xd51/0x1ac0 [ 557.204683] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 557.204705] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 557.298458] ? __list_add_valid+0xb8/0x450 [ 557.302704] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 557.308157] ? pick_next_task_fair+0x22c9/0x2530 [ 557.312925] ? _cond_resched+0x3c/0xd0 [ 557.316826] shmem_file_read_iter+0x508/0x1180 [ 557.321421] ? shmem_file_llseek+0xd80/0xd80 [ 557.325833] generic_file_splice_read+0x5d7/0x900 [ 557.330682] ? splice_shrink_spd+0x100/0x100 [ 557.335096] splice_direct_to_actor+0x4cb/0x1040 [ 557.340477] ? do_splice_direct+0x540/0x540 [ 557.344794] do_splice_direct+0x335/0x540 [ 557.348952] ? security_file_permission+0x1f0/0x480 [ 557.353967] do_sendfile+0x107b/0x1e40 [ 557.357864] __x64_sys_sendfile64+0x218/0x390 [ 557.362351] ? __ia32_sys_sendfile+0x160/0x160 [ 557.366923] do_syscall_64+0x15b/0x230 [ 557.370810] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 557.375989] RIP: 0033:0x455ab9 [ 557.379171] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 557.386880] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 557.394135] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 557.401499] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 557.408751] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 00:17:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '('}], 0xa, "3a3c326abd24abd0bd676df19e3a53791bfb2289348b646074220895141724903b76f42e5345bfd6a90d39916d0a2b1e59df7e68e007363ae03b6da7fb771dc34edfa495b155b94ec58093798e17f9afa5025d896f1dcdfa0afaccafaa61a72165a7dc4aaa25780c763e8833074d608d3fdab160104f6233126d534a8bf8138dde802f55d9"}, 0x92) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r5 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x9, 0x4000) sendmsg$kcm(r5, &(0x7f0000000a40)={&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x3, 0x3, 0x2, 0x3}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0)="2d307bac174838fe71fdd00f1fa2b4a9bc37b233c43e3e236833511168b620d19327daaa7326e36315e4a9630e2c53e123a87d95874bf12b67eb71f67bfb428a806673c95d1fe436f89086bbb1d6402dc5b477a07bb83e3cc8c460215709", 0x5e}, {&(0x7f0000000440)="801d9f6484e987630d5d69b1f874d005933dd1211e8dd43810e9cc9298ccdf5f7055fb69bd16c5aa265062efa8d2af6433f7fa6ff7da3467871be88d7b1384f99ab6d38de3eb5ad0fe6a3bacc261ca4b74073f9b59ec915290071b711e36bf3f1e618d3a80dbfb216beea520c4fc3b344d6d2f80a702bacf439e8a6b793ead6af30cde66c64585d52f91293b1259b19e91087168dd3dc80506da479091", 0x9d}], 0x2, &(0x7f0000000540)=[{0xc0, 0x10b, 0x1000, "f8b9b9a4c768a24bbcc98356f9062c45b05ebe2e2bdb0fb0985a1174ce8c53d1168688be594af88150f3ff73e471ec2e9f9a0abd9e4d5a487c5247e55e2c71ab32ae6500ae2c363131ca1082704c0aa2b7d35f74b82a15ebc3844e5254ec549c984c372ce240f34972bd7bf56e397bc29077dcb00dca77b15d8c34d0af2eac1b723d6190b529a3c1e9509054c120ff07f2055b1e8200f1046ac48adfc82f3c4e34575d2f1f13c24acc6c1e61"}, {0x18, 0x110, 0x4000000000000, "ac361d4aa494faf1"}, {0xd8, 0x118, 0x81, "2dd18c3c4be02e8f69dfb5df16d2a044e855a5fe948dc36b44ea874e145a29863371b23e0e081307551555843ae3d86f5ed9ca60622d048d819ad79e3788c4bf62bf9db2342f34f421e03f8db5cda08c1c5ccb2201de46813f8ec82692b40b29e512d2f9e99a5d871f8ecb08a1218946cdcb6691744226bf970a137d84ff9fd913a8c426a09b0c93312ad84d7a6ac98280415c29456b7d1cac6b5ed92902a7b686a6febd52b81dca54bcea676f552091da189d89eee35900588b5ffefc4fb89bbc"}, {0x10, 0x1ff}, {0xb8, 0x1ff, 0xfff, "6dbda80152a3285194570df5de4cbf78463454d02cbe8610f1ef577955176cf859dfdce4470617362dc7d1aefbeda3695d094389f7118fc1340efb446286634eadb94a3a275fd1e2201119875e2117776a3a6f2a27f16e1d759fd954880f94b0ae70cc3568777a4ae996226c23ee0ed4577a33a92fad08df61ae6f6382625061e790709de32aa7c74461ae49398d1ef48f6c188a3bba0f4ee4529b38ef8f91f6a9"}, {0xd8, 0x104, 0x9, "a88310eaed89beb28aaec4788354bddf5a3fd3fbd4769516fec1c388ad860c87039aa9f7bb1cf6343a767543da771444da7677144c3e3b5a6fc80502c6463d24f9a1f74eb2d4dc51433417c82dcc57d57cb5760e2d5b24cbf151f8d6efeb93853da7eb4ce7e465f10bfb563ff8c4e9e18f39d81e4008ea04af493f653a49a169cb07861f8f1d55e613ad9475b332a96a29616325916453ae9a984b171197b33a6a1ac7637868b872442a02569c1f16786f48a672e46244d759d04885e9e8a4e861"}, {0x20, 0x117, 0xc9, "0c753c3721bb14238e015236"}, {0xe0, 0x1ff, 0x0, "62182f77ba30b48539cfa55bd225198d23146d09ea959ebdad6d4e5dec66a38d04e515318c1eda856aea75bf25c53505aac18cc14676491084153689ed144f60b43a612c63b68ade1f54cf88ebcd84da37c0e2aeab40645c8815d361afa1629605e055df5de4b596d06958ba7f4bb83802613059dcf11d48bf8d536df2e20fe6a0e77ad58f9474d139321930ff03595356aac10e6799c281fc3db517a1fe598d9509a778402540235703c33885c2cc60117f8e1aa49eaf69b59adb485d320c588c1991452135247d94f4c275e6"}, {0x88, 0x11, 0x1, "96ce2ba73076246e4d9465ea2b9698a7858fcf96dad7fb61b6cb5b57a3c5953fefef9743393c0de51da9b88dec0b96c0410666c26f5427863f8530b1c6e9c2f45814571bf0b77559833ba49b7fa87814bc8f2ccbe2ee3641eeb222b59486fdc2865100b4d40ce191e923147f1907f5f0a6f71964"}], 0x4d8, 0x8000}, 0x4000010) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ppoll(&(0x7f0000000000)=[{r0, 0x100}, {r0, 0x10}, {r1, 0x40}, {r1, 0x10}, {r0, 0x50}, {r1, 0x4}, {r1}], 0x7, &(0x7f0000000280)={r3, r4+30000000}, &(0x7f00000002c0)={0x100000000}, 0x8) 00:17:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000080)) 00:17:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)=',]\x00', r0}, 0x10) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0xf503}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x27, 0x1, 0x0, 0x0, {0x14}, [@typed={0x8, 0x7, @str=',]\x00'}]}, 0x1c}, 0x1}, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000240)={0x100000001, {{0xa, 0x4e20, 0xffffffff80000001, @empty, 0xfffffffffffffffd}}}, 0x88) [ 557.416007] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000016 [ 557.456405] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 00:17:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000080)) [ 557.508105] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 00:17:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x0) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:17:11 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x200001, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x9, 0x4) r1 = socket(0x10, 0x803, 0x0) write(r1, &(0x7f0000000200)="2600000022004701050007008980e8ff0ac2e2858504000000000000002e96c0e9ff094a51f1", 0x26) accept4$unix(r1, &(0x7f0000000000), &(0x7f0000000100)=0x6e, 0x800) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000240)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x363, &(0x7f0000000080), 0x0, &(0x7f0000000180)=""/79, 0x4f}, 0x0) [ 558.769300] bridge0: port 1(bridge_slave_0) entered blocking state [ 558.775732] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.783060] device bridge_slave_0 entered promiscuous mode [ 558.823543] bridge0: port 2(bridge_slave_1) entered blocking state [ 558.829950] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.837227] device bridge_slave_1 entered promiscuous mode [ 558.877810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 558.918541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 559.033568] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 559.076859] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 559.260419] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 559.267721] team0: Port device team_slave_0 added [ 559.307508] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 559.314716] team0: Port device team_slave_1 added [ 559.355967] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 559.400121] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 559.444184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 559.487917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 559.901655] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.908079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 559.914861] bridge0: port 1(bridge_slave_0) entered blocking state [ 559.921438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 559.929242] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 560.607234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 561.448192] 8021q: adding VLAN 0 to HW filter on device bond0 [ 561.596946] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 561.740964] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 561.747226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 561.754635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 561.895163] 8021q: adding VLAN 0 to HW filter on device team0 [ 562.743645] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 562.754973] syz-executor7 cpuset=syz7 mems_allowed=0 [ 562.760241] CPU: 0 PID: 28872 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 562.767158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.776501] Call Trace: [ 562.779103] dump_stack+0x185/0x1d0 [ 562.782727] dump_header+0x2cc/0x16f0 [ 562.786522] ? __msan_poison_alloca+0x15c/0x1d0 [ 562.791198] ? oom_kill_process+0x2e0/0x2160 [ 562.795611] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 562.801067] ? ___ratelimit+0x67f/0x760 [ 562.805053] oom_kill_process+0x341/0x2160 [ 562.809288] ? mem_cgroup_scan_tasks+0x289/0x610 [ 562.814048] out_of_memory+0x1700/0x1da0 [ 562.818107] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 562.823491] ? _cond_resched+0x8b/0xd0 [ 562.827394] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 562.832607] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 562.838005] pagefault_out_of_memory+0x57/0x110 [ 562.842684] mm_fault_error+0x460/0x7c0 [ 562.846671] __do_page_fault+0x1274/0x1a10 [ 562.850933] do_page_fault+0xb7/0x250 [ 562.854739] ? page_fault+0x8/0x30 [ 562.858283] page_fault+0x1e/0x30 [ 562.861728] RIP: 0033:0x407198 [ 562.864906] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 562.870261] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 562.877518] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 562.884778] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 562.892038] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 562.899308] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 562.907379] Task in /syz7 killed as a result of limit of /syz7 [ 562.913505] memory: usage 1196kB, limit 0kB, failcnt 148 [ 562.919052] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 562.925846] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 562.932076] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 562.951923] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 562.960726] [28872] 0 28872 17553 8392 118784 0 0 syz-executor7 [ 562.969611] Memory cgroup out of memory: Kill process 28872 (syz-executor7) score 8421000 or sacrifice child [ 562.979662] Killed process 28872 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB [ 563.010574] oom_reaper: reaped process 28872 (syz-executor7), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB 00:17:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000080)) 00:17:17 executing program 0 (fault-call:5 fault-nth:23): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:17:17 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clock_gettime(0x80000007, &(0x7f00000003c0)={0x0}) r2 = getpid() r3 = syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/ipc\x00') ppoll(&(0x7f0000000100), 0x0, &(0x7f0000000200)={r1}, &(0x7f00000001c0), 0x8) getpeername$unix(r0, &(0x7f0000000280)=@abs, &(0x7f0000000140)=0x6e) socket$pppoe(0x18, 0x1, 0x0) r4 = dup2(r3, r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001dc0)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000001ec0)=0xe8) sendmsg$nl_route_sched(r4, &(0x7f0000001f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8024200}, 0xc, &(0x7f0000001f40)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000002e00000125bd7000fcdbdf2500000000c21de3145718812a40639d1b9d2cdf3eac6d0962a17d61ff732eff902873d04548711873a32f9ef747106ca8a7e0a4cc695bf9ce730f6ffff02be81cfe98f033e4d850bd2c11983230fbe8c43111d5fa8d", @ANYRES32=r5, @ANYBLOB="080008000c00e0ff0000fbff08000b000300000008000b0004000000"], 0x34}, 0x1, 0x0, 0x0, 0x8050}, 0x1) connect$pppoe(r4, &(0x7f0000000240)={0x18, 0x0, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'veth0_to_team\x00'}}, 0x1e) shutdown(r0, 0x2) r6 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc62, 0x800000000) connect$rds(r6, &(0x7f0000000cc0)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) 00:17:17 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0xa, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x101, 0xa, 0x7, 0x0, 0xc, 0x4}, @ldst={0x0, 0x2, 0x7, 0x6, 0x0, 0xffffffd0, 0xfffffffffffffffc}, @map={0x18, 0xa, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x26}, @generic={0x6, 0x8, 0x0, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x94, &(0x7f0000000140)=""/148, 0x41100, 0x1, [], 0x0, 0x5}, 0x48) semget(0x2, 0x3, 0x80) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x240000, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c40)=@nat={'nat\x00', 0x19, 0x5, 0x890, [0x20000380, 0x0, 0x0, 0x20000608, 0x20000638], 0x0, &(0x7f0000000340), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xb, 0x0, 0x8a1f, 'bridge0\x00', 'bridge0\x00', 'veth0_to_team\x00', 'gre0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}}, {{{0x5, 0x4a, 0x6558, 'rose0\x00', 'nr0\x00', 'rose0\x00', 'veth0_to_team\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0x0, 0x0, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0x100, 0x178, 0x1b0, [@cpu={'cpu\x00', 0x8, {{0x3, 0x1}}}, @arp={'arp\x00', 0x38, {{0x0, 0x8e8f, 0x8, @multicast1=0xe0000001, 0xffffffff, @local={0xac, 0x14, 0x14, 0xaa}, 0xffffff00, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x21}, [0x0, 0xff, 0x0, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0x1, 0x40}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x10001, 0x10001, 0x1, 0x0, "1d8238174edb5310a4313ec0f27ca10a7f59c9c18857003594d8ddc5d1a73f921dc029daad0a8c3463e3044b65164824b701a9cb699f44fdec38b816f6d6f5e9"}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x19, 0x20, 0x5, 'veth0_to_team\x00', 'irlan0\x00', 'syz_tun\x00', 'bond0\x00', @random="b520353e450e", [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, [0x0, 0xff, 0x0, 0xff], 0x70, 0xa8, 0xd8}, [@arpreply={'arpreply\x00', 0x10, {{@random="215341ac07e5", 0xffffffffffffffff}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5a}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x2, [{{{0xb, 0x1d, 0x4, 'syzkaller0\x00', 'rose0\x00', 'bcsf0\x00', 'bpq0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xb}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0x2a8, 0x318, 0x350, [@bpf0={'bpf\x00', 0x210, {{0xd, [{0x7fff, 0x8, 0x0, 0xfffffffffffffff8}, {0x847, 0x4, 0x13a6, 0xc0}, {0x9, 0x275, 0x7, 0x1}, {0x7, 0x10000, 0x1, 0x2}, {0x31, 0xcb4, 0xe43, 0x8001}, {0x1271, 0x3f, 0x7, 0x101}, {0xfffffffffffffffd, 0x4, 0x1, 0x9}, {0x401, 0x40, 0x400, 0x3}, {0x0, 0x0, 0x100, 0xfffffffffffffffb}, {0x12b, 0x4, 0xfffffffffffffc01, 0xbd}, {0xfffffffffffffffb, 0x8000, 0x8000, 0x20}, {0x1, 0x8, 0x7f13469d, 0xf4c}, {0x6, 0x2d, 0x7ff, 0x7}, {0x8, 0xfffffffffffffffa, 0x7f, 0x2}, {0x401, 0x80000001, 0x18a, 0x43}, {0x40, 0x6, 0x20000, 0x45}, {0x8001, 0x6, 0x81, 0x1}, {0x0, 0x8, 0x1f, 0x1000}, {0xffffffffffffff8f, 0x6, 0x9, 0x20}, {0x5, 0x2, 0x683, 0x879}, {0x8, 0x5, 0x800, 0xdc3}, {0x401, 0x4, 0x3, 0x100000000}, {0x6, 0x3ff, 0x3ff, 0x3}, {0x2, 0xffff, 0x1f, 0x3}, {0x6, 0x3, 0x2, 0x5}, {0x7ff, 0x2, 0x3c, 0x5}, {0x6b91, 0x0, 0x8, 0x6}, {0x1, 0x8000, 0x0, 0x2}, {0x400, 0x3, 0xa0d, 0xff}, {0x81, 0x3, 0x4, 0x4}, {0x3, 0x8000, 0xeb, 0x101}, {0x7fff, 0x8, 0x1, 0x2}, {0x80000001, 0xfffffffffffffff7, 0x1}, {0x430, 0x0, 0x3ff, 0x7}, {0x8000, 0xff, 0x3000, 0x1000000000000}, {0x40000000, 0x100, 0x400, 0x7}, {0x8, 0x1, 0x1ff, 0x7}, {0x3, 0x0, 0x80000001, 0xf}, {0x7, 0x4, 0x800, 0x4}, {0xf9, 0x6, 0x3, 0x2}, {0x4, 0x400, 0x1, 0x3}, {0x9, 0x8000, 0x9}, {0x1, 0x4, 0x3, 0xff}, {0x4b, 0x8000, 0x725, 0x9}, {0x6, 0x81, 0x713, 0x1000}, {0x80000000, 0x5, 0x800, 0x7}, {0x4, 0xb30a, 0x0, 0x40}, {0x40, 0x7ff, 0x1}, {0x40, 0x7, 0x2, 0x6}, {0x378, 0x3ff, 0x8}, {0x9, 0x3f, 0x45, 0x9}, {0x1, 0xfffffffffffffeff, 0x2, 0x1}, {0x8, 0x1d7, 0x101}, {0x8, 0x3, 0x6, 0x9}, {0x7, 0x2, 0x6, 0x1}, {0x8, 0x0, 0x5, 0x8}, {0x1ff, 0x5, 0x5, 0x42}, {0x200, 0x0, 0x8001, 0xffffffff}, {0x9, 0x6, 0x5, 0x1}, {0x5, 0x1ff, 0xfff}, {0x1000, 0x400, 0x4, 0x7}, {0x800, 0x9, 0x6}, {0xc0000000000, 0x2, 0x101, 0x9}, {0x6, 0x6, 0x80000000, 0xffffffffffffffa3}], 0x96}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xffffffffffffffff}}}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffd}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xfffffffffffffffc}}}}, {{{0x5, 0x4, 0xe8bf, 'bridge0\x00', 'veth0\x00', 'ip6tnl0\x00', 'bcsh0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0x0, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x10}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x118, 0x150, [@pkttype={'pkttype\x00', 0x8, {{0x6, 0x1}}}, @time={'time\x00', 0x18, {{0x53ce, 0x15, 0xe8f1, 0x8ab1, 0x8000, 0x401, 0x2}}}]}, [@snat={'snat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xfffffffffffffffd}}}]}, @snat={'snat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}]}, 0x908) setsockopt$inet_group_source_req(r2, 0x0, 0x2c, &(0x7f0000000cc0)={0x1000, {{0x2, 0x4e20, @loopback=0x7f000001}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}}}, 0x108) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000e00)=0x4, 0x4) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000e40)=""/4096) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000001e40)={0x4, 0x2, 0x20}) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000001ec0)) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000001f00), &(0x7f0000001f40)=0x8) name_to_handle_at(r2, &(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)={0x3d, 0x1, "5372dce55c6ff9eeccb3b052cd2722781990b92c1e69e85362b3adc69e13acd729e1836e991776b79bbcc17a163fbb030d2adc3493"}, &(0x7f0000002000), 0x400) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000002040)) connect$rds(r0, &(0x7f0000002080)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/hwrng\x00', 0x180, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f0000002100)={@rand_addr, @broadcast}, &(0x7f0000002140)=0x8) r4 = socket(0x9, 0x7, 0x4) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000002180)=[0x6, 0x4]) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f0000002340)={&(0x7f00000021c0)={0x10, 0x0, 0x0, 0x2020200}, 0xc, &(0x7f0000002300)={&(0x7f0000002240)={0x8c, r5, 0x4, 0x70bd2a, 0x25dfdbfb, {0xc}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x57a}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x62}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x50}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4811}, 0x24000800) r6 = memfd_create(&(0x7f0000002380)='veth0_to_team\x00', 0x3) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f00000023c0)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000002400)=0x10) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000002440)) statx(r2, &(0x7f0000002480)='./file0\x00', 0x400, 0x800, &(0x7f00000024c0)) statx(r0, &(0x7f00000025c0)='./file0\x00', 0x6000, 0x204, &(0x7f0000002600)) fstatfs(r3, &(0x7f0000002700)=""/8) sendmsg$nl_netfilter(r6, &(0x7f00000028c0)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x10048000}, 0xc, &(0x7f0000002880)={&(0x7f0000002780)={0xf0, 0x0, 0x8, 0x4, 0x70bd28, 0x25dfdbfc, {0xb, 0x0, 0x6}, [@typed={0x4, 0x44}, @generic="1e2c10c068eadc33645599a26302c8235accf129f3abd2cfaeb9d9fb560b84b7df0f01bf43600d13b9db566914014079e992d98aca3b61c9a24026afa74ffb5472d1a136ca2115e2f82ddbda0fc95899c1b61354955bd99775bcebbe50413713d717423f9929ac0648e3f0d2a326949a7de8df83f9b2058c661e41a760f0c8d4cd759dc7d101cc0c172909b46209eef16e96a597fca2b490de7a38dec3c0c7f64c3c59f6b9a9981f93911535ad0cc3b525fde57cff48abad7e6684035de31469ad27c595bf92afc1c1275a1b3220218e267654ffa538"]}, 0xf0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 00:17:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:17:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000000c0)) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0x2) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x4, 0x20, 0x81, 0x200}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x6}, &(0x7f00000001c0)=0x8) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000200)={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, {0x306, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x2, {0x2, 0x4e20, @broadcast=0xffffffff}, 'veth1\x00'}) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:17:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r4, 0x3) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r3, &(0x7f00000001c0)='./file0\x00', r5, r6, 0x400) 00:17:17 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000180)={0x4}, 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x7, 0x3, 0x6b}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') mlock2(&(0x7f00007e7000/0x1000)=nil, 0x1000, 0x0) sendfile(r3, r4, &(0x7f0000000000), 0x100000080000000) [ 563.193946] FAULT_INJECTION: forcing a failure. [ 563.193946] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 563.205795] CPU: 0 PID: 29175 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 563.212719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.222068] Call Trace: [ 563.224657] dump_stack+0x185/0x1d0 [ 563.228290] should_fail+0x87b/0xab0 [ 563.232018] __alloc_pages_nodemask+0x600/0x5cc0 [ 563.236781] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 563.242148] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 563.247599] ? get_page_from_freelist+0xacd1/0xb7b0 [ 563.252619] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 563.258068] ? __save_stack_trace+0x90d/0xb00 [ 563.262580] kmsan_alloc_meta_for_pages+0x109/0x3b0 [ 563.267601] ? alloc_pages_vma+0xcc6/0x17f0 [ 563.271920] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 563.277106] ? shmem_getpage_gfp+0x3991/0x59c0 [ 563.281686] ? splice_direct_to_actor+0x4cb/0x1040 [ 563.286614] ? do_sendfile+0x107b/0x1e40 [ 563.290674] ? __x64_sys_sendfile64+0x218/0x390 [ 563.295339] ? do_syscall_64+0x15b/0x230 [ 563.299403] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 563.304771] ? kmsan_set_origin_inline+0x6b/0x120 [ 563.309618] kmsan_alloc_page+0x82/0xe0 [ 563.313597] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 563.318350] ? kmsan_set_origin_inline+0x6b/0x120 [ 563.323191] ? __msan_poison_alloca+0x15c/0x1d0 [ 563.327858] ? kmem_cache_alloc+0x6c7/0xb70 [ 563.332184] ? memcg_kmem_put_cache+0x40/0x290 [ 563.336762] ? kmem_cache_alloc+0x6c7/0xb70 [ 563.341082] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 563.346453] ? kmem_cache_alloc+0xa97/0xb70 [ 563.350780] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 563.356146] ? __bitmap_intersects+0x173/0x300 [ 563.360734] alloc_pages_vma+0xcc6/0x17f0 [ 563.364893] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 563.369916] ? find_lock_entry+0xc8/0x720 [ 563.374070] ? find_get_entry+0x7ef/0x820 [ 563.378227] ? shmem_getpage_gfp+0x61f/0x59c0 [ 563.382729] ? shmem_getpage_gfp+0x61f/0x59c0 [ 563.387232] shmem_getpage_gfp+0x3991/0x59c0 00:17:17 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x4, &(0x7f0000000300)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x80, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0385720, &(0x7f0000000240)={0x1, {0x77359400}, 0xfff, 0xfffffffffffff6b6}) fchdir(r0) shutdown(r0, 0x2) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9fd6, 0x40) fcntl$setflags(r0, 0x2, 0x1) getsockopt$packet_int(r4, 0x107, 0x6, &(0x7f0000000140), &(0x7f0000000280)=0x9a) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x4000) [ 563.391645] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 563.396317] ? __wake_up_common_lock+0x10c/0x370 [ 563.401082] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 563.406567] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 563.411937] ? vmalloc_to_page+0x50b/0x630 [ 563.416186] ? _cond_resched+0x3c/0xd0 [ 563.420085] shmem_file_read_iter+0x508/0x1180 [ 563.424684] ? shmem_file_llseek+0xd80/0xd80 [ 563.429101] generic_file_splice_read+0x5d7/0x900 [ 563.433963] ? splice_shrink_spd+0x100/0x100 [ 563.438377] splice_direct_to_actor+0x4cb/0x1040 [ 563.443139] ? do_splice_direct+0x540/0x540 [ 563.447483] do_splice_direct+0x335/0x540 [ 563.451635] ? security_file_permission+0x1f0/0x480 [ 563.456669] do_sendfile+0x107b/0x1e40 [ 563.460584] __x64_sys_sendfile64+0x218/0x390 [ 563.465088] ? __ia32_sys_sendfile+0x160/0x160 [ 563.469671] do_syscall_64+0x15b/0x230 [ 563.473571] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 563.478758] RIP: 0033:0x455ab9 [ 563.481948] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 00:17:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2000000ffffffff, 0x3) 00:17:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="c31ed84d44082b8eaf4ff420267f2a73337f6a9da7a3ea68332a4ad2966694ca17da56964b2db4b8480921476874cc81eb8d8395fee87de078bd2ab4908ceb1b123203cced2deb4b8cce5550c2d95e881877b449b742f2fb17a3060fa1759cff3cd2f667a1dc5173becb5b6942112d2379475e6fea489db2d1ddc0b49d2d26b1f99a92ab340ac4f06350a875cba0e8134f4d80e482699763bbc5eda47238f6b464a3", 0xa2, 0x800, &(0x7f0000000140)={0xa, 0x4e21, 0x7, @loopback={0x0, 0x1}, 0x8001}, 0x1c) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) setitimer(0x2, &(0x7f0000000180)={{0x77359400}}, &(0x7f00000001c0)) [ 563.489659] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 563.496928] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 563.504194] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 563.511463] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 563.518730] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000017 00:17:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = request_key(&(0x7f0000000040)='big_key\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)='%{em1#wlan1f\x00', 0xfffffffffffffff9) r2 = add_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="fbd20f669698e84f89ef152decc6b9c83d4dcc4d6a6f9b797a0886489fc7bafcd569f9057f60376565d95ef3831709adf62adbea8407c83a47870e3e3bc0df1867cef6678037e2b4fb827d6c0982965dfbd975a61fe621da3183536f40abc40e3cbca7932bcd8d3c75988445bc36c31e74ea49c833df3b0b1700b3e87e9404adb620da48df05238b8cfd192d809c76385659347a77ff2692ff85a2b06db2a1e3d914dd4956b8732212563d75e5f045dc42f64820f97f313b315311d0f1ab", 0xbe, 0xfffffffffffffffb) keyctl$search(0xa, r1, &(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, r2) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0x3d5, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) socket$alg(0x26, 0x5, 0x0) r4 = accept(r0, 0x0, &(0x7f0000000140)) setsockopt$inet_opts(r4, 0x0, 0x0, &(0x7f00000001c0), 0x91) 00:17:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x0, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a3929e776c66d5ee1bc461a7ca375d4139ea4", 0x97) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 563.658307] device bridge_slave_1 left promiscuous mode [ 563.664227] bridge0: port 2(bridge_slave_1) entered disabled state 00:17:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x4a0440) ioctl$TIOCSTI(r1, 0x5412, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f00000000c0)={0x19, 0x0, 0xffffffffffffffff, {0x77359400}, 0x994, 0xffffffffffffff81}) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x80, 0x408000) 00:17:17 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400, 0x0) getdents64(r1, &(0x7f00000000c0)=""/64, 0x40) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000100)={0x10001, 0x0, 0x8000, 0x5, 0x4, 0x3476, 0x7ff, 0x100, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0x8}, &(0x7f00000001c0)=0x8) [ 563.748083] device bridge_slave_0 left promiscuous mode [ 563.753906] bridge0: port 1(bridge_slave_0) entered disabled state 00:17:17 executing program 0 (fault-call:5 fault-nth:24): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:17:17 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40000, 0x38) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), 0x4) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x4e20, @broadcast=0xffffffff}, {0x1, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xd}}, 0x8, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 'bond0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) [ 563.959951] Unknown ioctl 3 [ 563.966323] team0 (unregistering): Port device team_slave_1 removed [ 563.997625] FAULT_INJECTION: forcing a failure. [ 563.997625] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 564.009718] CPU: 0 PID: 29214 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 564.016666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.026040] Call Trace: [ 564.028682] dump_stack+0x185/0x1d0 [ 564.032346] should_fail+0x87b/0xab0 [ 564.036126] __alloc_pages_nodemask+0x600/0x5cc0 [ 564.040926] ? kmsan_set_origin_inline+0x6b/0x120 [ 564.045822] ? __msan_poison_alloca+0x15c/0x1d0 [ 564.050523] ? kmem_cache_alloc+0x6c7/0xb70 [ 564.054883] ? memcg_kmem_put_cache+0x40/0x290 00:17:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180), 0x338) 00:17:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x101004, 0x0) syz_open_pts(r0, 0x305940) [ 564.057429] IPVS: ftp: loaded support on port[0] = 21 [ 564.059490] ? kmem_cache_alloc+0x6c7/0xb70 [ 564.059543] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 564.059584] ? kmem_cache_alloc+0xa97/0xb70 [ 564.059620] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 564.084166] ? __bitmap_intersects+0x173/0x300 [ 564.088812] alloc_pages_vma+0xcc6/0x17f0 [ 564.093035] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 564.098115] ? find_lock_entry+0xc8/0x720 [ 564.102321] ? find_get_entry+0x7ef/0x820 [ 564.106522] ? shmem_getpage_gfp+0x61f/0x59c0 [ 564.111070] ? shmem_getpage_gfp+0x61f/0x59c0 [ 564.115628] shmem_getpage_gfp+0x3991/0x59c0 [ 564.120097] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 564.125600] ? __list_add_valid+0xb8/0x450 [ 564.129898] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 564.135405] ? pick_next_task_fair+0x22c9/0x2530 [ 564.140264] ? _cond_resched+0x3c/0xd0 [ 564.144266] shmem_file_read_iter+0x508/0x1180 [ 564.148910] ? shmem_file_llseek+0xd80/0xd80 [ 564.153368] generic_file_splice_read+0x5d7/0x900 [ 564.158282] ? splice_shrink_spd+0x100/0x100 [ 564.161867] Unknown ioctl 3 [ 564.162764] splice_direct_to_actor+0x4cb/0x1040 [ 564.162815] ? do_splice_direct+0x540/0x540 [ 564.162889] do_splice_direct+0x335/0x540 [ 564.162937] ? security_file_permission+0x1f0/0x480 [ 564.162984] do_sendfile+0x107b/0x1e40 [ 564.188109] __x64_sys_sendfile64+0x218/0x390 [ 564.192664] ? __ia32_sys_sendfile+0x160/0x160 [ 564.197282] do_syscall_64+0x15b/0x230 [ 564.201222] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 564.206431] RIP: 0033:0x455ab9 [ 564.209642] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 564.217383] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 564.224676] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 564.231967] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 564.239256] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 564.246546] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000018 [ 564.254826] team0 (unregistering): Port device team_slave_0 removed 00:17:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:17:18 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x281, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000140)=0x6, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x1, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r2}, {r1}], 0x200002b3, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x4) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000001c0)=0x1000) [ 564.295963] bond0 (unregistering): Releasing backup interface bond_slave_1 00:17:18 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x78000080, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = socket$inet_sctp(0x2, 0x800000000001, 0x84) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000100)="2900e1311f16f474671070") perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x100000000009) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000000)={{{@in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000140)=0xe8) listen(r1, 0x3) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x1000) 00:17:18 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), r4, 0x1}}, 0x18) shutdown(r0, 0x2) [ 564.397465] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 564.486368] bond0 (unregistering): Released all slaves [ 565.596643] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.603069] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.610649] device bridge_slave_0 entered promiscuous mode [ 565.651450] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.657845] bridge0: port 2(bridge_slave_1) entered disabled state [ 565.665146] device bridge_slave_1 entered promiscuous mode [ 565.706268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 565.748667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 565.867236] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 565.911159] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 566.099643] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 566.106829] team0: Port device team_slave_0 added [ 566.147526] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 566.154774] team0: Port device team_slave_1 added [ 566.195904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 566.238700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 566.281786] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 566.289096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 566.297543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 566.334063] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 566.341493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 566.351850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 566.751618] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.758076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 566.764821] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.771196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 566.778937] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 567.583160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 568.272367] 8021q: adding VLAN 0 to HW filter on device bond0 [ 568.414581] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 568.555152] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 568.561383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 568.569640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 568.702906] 8021q: adding VLAN 0 to HW filter on device team0 [ 569.530964] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 569.542049] syz-executor7 cpuset=syz7 mems_allowed=0 [ 569.547238] CPU: 0 PID: 29221 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 569.554158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.563509] Call Trace: [ 569.566113] dump_stack+0x185/0x1d0 [ 569.569737] dump_header+0x2cc/0x16f0 [ 569.573542] ? __msan_poison_alloca+0x15c/0x1d0 [ 569.578215] ? oom_kill_process+0x2e0/0x2160 [ 569.582644] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 569.588097] ? ___ratelimit+0x67f/0x760 [ 569.592087] oom_kill_process+0x341/0x2160 [ 569.596317] ? mem_cgroup_scan_tasks+0x289/0x610 [ 569.601073] out_of_memory+0x1700/0x1da0 [ 569.605136] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 569.610508] ? _cond_resched+0x8b/0xd0 [ 569.614405] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 569.619602] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 569.624974] pagefault_out_of_memory+0x57/0x110 [ 569.629646] mm_fault_error+0x460/0x7c0 [ 569.633645] __do_page_fault+0x1274/0x1a10 [ 569.637884] do_page_fault+0xb7/0x250 [ 569.641675] ? page_fault+0x8/0x30 [ 569.645205] page_fault+0x1e/0x30 [ 569.648647] RIP: 0033:0x407198 [ 569.651825] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 569.657181] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 569.664442] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 569.671699] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 569.678958] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 569.686218] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 569.693667] Task in /syz7 killed as a result of limit of /syz7 [ 569.700231] memory: usage 1196kB, limit 0kB, failcnt 156 [ 569.705737] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 569.712550] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 569.718734] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 569.738547] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 569.747340] [29221] 0 29221 17553 8392 118784 0 0 syz-executor7 [ 569.756218] Memory cgroup out of memory: Kill process 29221 (syz-executor7) score 8421000 or sacrifice child [ 569.766276] Killed process 29221 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB [ 569.797768] oom_reaper: reaped process 29221 (syz-executor7), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB 00:17:23 executing program 7: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') setns(r2, 0x0) 00:17:23 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f00000001c0)={{0x6f, @dev={0xac, 0x14, 0x14, 0xe}, 0x4e20, 0x4, 'sh\x00', 0x1c, 0x7, 0x4d}, {@empty, 0x4e21, 0x3, 0x3f, 0x4}}, 0x44) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r2}, {r1}], 0x2, &(0x7f0000000080)={r3}, &(0x7f00000000c0), 0x8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @empty, @local}, &(0x7f0000000240)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000280)={'team0\x00', r4}) shutdown(r1, 0x0) 00:17:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x22000, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000080)) 00:17:23 executing program 5: ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000000)) socketpair(0x8, 0x20000000000004, 0x2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0xfffffffffffffe00, 0x80000001, 0x4, 0x100000000, 0x4f, 0x7f, 0x8001, 0x0, 0x0, 0x97a3, 0x7}) 00:17:23 executing program 0 (fault-call:5 fault-nth:25): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:17:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380), 0x0) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:17:23 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x80000) r0 = socket$kcm(0x29, 0xfffffffffffe, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)) 00:17:23 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0xf, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r0}, {r1}], 0x2, &(0x7f0000000000)={r2}, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x8) shutdown(r0, 0x2) r3 = socket(0x11, 0x4, 0x624) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f00000001c0)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) [ 570.009655] FAULT_INJECTION: forcing a failure. [ 570.009655] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 570.021502] CPU: 0 PID: 29524 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 570.028428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.037779] Call Trace: [ 570.040371] dump_stack+0x185/0x1d0 [ 570.044003] should_fail+0x87b/0xab0 [ 570.047728] __alloc_pages_nodemask+0x600/0x5cc0 [ 570.052491] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 570.057856] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 570.063304] ? get_page_from_freelist+0xacd1/0xb7b0 [ 570.068330] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 570.073780] ? __save_stack_trace+0x90d/0xb00 [ 570.078299] kmsan_alloc_meta_for_pages+0x81/0x3b0 [ 570.083232] ? alloc_pages_vma+0xcc6/0x17f0 [ 570.087554] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 570.092753] ? shmem_getpage_gfp+0x3991/0x59c0 [ 570.097338] ? splice_direct_to_actor+0x4cb/0x1040 [ 570.102277] ? do_sendfile+0x107b/0x1e40 [ 570.106344] ? __x64_sys_sendfile64+0x218/0x390 [ 570.111015] ? do_syscall_64+0x15b/0x230 [ 570.115082] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 570.120453] ? __msan_poison_alloca+0x15c/0x1d0 [ 570.125129] ? kmsan_set_origin_inline+0x6b/0x120 [ 570.129978] kmsan_alloc_page+0x82/0xe0 [ 570.133954] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 570.138713] ? kmsan_set_origin_inline+0x6b/0x120 [ 570.143560] ? __msan_poison_alloca+0x15c/0x1d0 [ 570.148237] ? kmem_cache_alloc+0x6c7/0xb70 [ 570.152573] ? memcg_kmem_put_cache+0x40/0x290 [ 570.157158] ? kmem_cache_alloc+0x6c7/0xb70 [ 570.161483] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 570.166937] ? kmem_cache_alloc+0xa97/0xb70 [ 570.171264] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 570.176627] ? __bitmap_intersects+0x173/0x300 [ 570.181216] alloc_pages_vma+0xcc6/0x17f0 [ 570.185374] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 570.190393] ? find_lock_entry+0xc8/0x720 [ 570.194539] ? find_get_entry+0x7ef/0x820 [ 570.198688] ? shmem_getpage_gfp+0x61f/0x59c0 [ 570.203183] ? shmem_getpage_gfp+0x61f/0x59c0 [ 570.207692] shmem_getpage_gfp+0x3991/0x59c0 [ 570.212101] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 570.216766] ? __wake_up_common_lock+0x10c/0x370 [ 570.221522] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 570.226979] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 570.232342] ? vmalloc_to_page+0x50b/0x630 [ 570.236591] ? _cond_resched+0x3c/0xd0 [ 570.240491] shmem_file_read_iter+0x508/0x1180 [ 570.245091] ? shmem_file_llseek+0xd80/0xd80 [ 570.249501] generic_file_splice_read+0x5d7/0x900 [ 570.254354] ? splice_shrink_spd+0x100/0x100 [ 570.258766] splice_direct_to_actor+0x4cb/0x1040 [ 570.263525] ? do_splice_direct+0x540/0x540 [ 570.267861] do_splice_direct+0x335/0x540 [ 570.272017] ? security_file_permission+0x1f0/0x480 [ 570.277043] do_sendfile+0x107b/0x1e40 [ 570.280948] __x64_sys_sendfile64+0x218/0x390 [ 570.285460] ? __ia32_sys_sendfile+0x160/0x160 [ 570.290044] do_syscall_64+0x15b/0x230 [ 570.293940] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 570.299125] RIP: 0033:0x455ab9 [ 570.302313] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 00:17:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) 00:17:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) fcntl$setstatus(r2, 0x4, 0x0) 00:17:24 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xb53, 0x4000) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xffffffffffffe8e1, 0x0, 0x4, "98d4accf6522d41c958c03928cd681f9a4ea391b5bde369afa941658f1f377c64a1c22cb7d7fd0577bddcb324a0bee882a994363c154cbed92f05308b660592667cf84506adae2f8b49a48fe3b0b4b8a"}, 0xd8) shutdown(r0, 0x2) 00:17:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) [ 570.310022] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 570.317287] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 570.324552] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 570.331817] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 570.339079] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 0000000000000019 [ 570.411748] device bridge_slave_1 left promiscuous mode [ 570.417494] bridge0: port 2(bridge_slave_1) entered disabled state 00:17:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603", 0x4c) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) [ 570.485537] device bridge_slave_0 left promiscuous mode [ 570.491292] bridge0: port 1(bridge_slave_0) entered disabled state [ 570.499787] IPVS: ftp: loaded support on port[0] = 21 00:17:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000080)={0x2, 0x64, 0x9, 0x1000000000, 0x0, 0x4}) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:17:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x80000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x8000) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000080)) 00:17:24 executing program 4: r0 = inotify_init1(0x0) dup(r0) [ 570.697306] team0 (unregistering): Port device team_slave_1 removed [ 570.725720] team0 (unregistering): Port device team_slave_0 removed [ 570.748845] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 570.785462] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 570.813636] bond0 (unregistering): Released all slaves 00:17:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r1, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000440), &(0x7f0000000480)=0x4) r4 = fcntl$dupfd(r1, 0x406, r1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x80, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x7f}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e22, 0x80000000, @remote={0xfe, 0x80, [], 0xbb}, 0x5}}, 0x7, 0x5, 0x8, 0x3, 0x1}, 0x98) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x4e24, 0xffff, @mcast2={0xff, 0x2, [], 0x1}, 0x3f}}, 0x1000, 0x1, 0x7ef, "ec6b2d06b68ca4a0cf042f1cd6d9d796b1fef24c465e9a9e21680f93f02e6aa1b3b63e027d4faa90ca4fd07b65ddef75e2b8c4da8b66c6a70eae4ea1f61ff570a769277b53974b6bc32bd94075099394"}, 0xd8) [ 571.861534] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.867972] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.875742] device bridge_slave_0 entered promiscuous mode [ 571.917849] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.924239] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.931546] device bridge_slave_1 entered promiscuous mode [ 571.979724] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 572.031600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 572.147478] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 572.190580] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 572.374079] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 572.381461] team0: Port device team_slave_0 added [ 572.421604] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 572.428818] team0: Port device team_slave_1 added [ 572.469986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 572.513474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 572.556375] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 572.563584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 572.572718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 572.609752] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 572.616937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 572.626118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 573.026261] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.032656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 573.039386] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.045763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.053531] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 573.855136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 574.529180] 8021q: adding VLAN 0 to HW filter on device bond0 [ 574.668429] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 574.806706] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 574.812954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 574.821822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 574.957416] 8021q: adding VLAN 0 to HW filter on device team0 [ 575.790064] syz-executor7 invoked oom-killer: gfp_mask=0x14000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 575.801150] syz-executor7 cpuset=syz7 mems_allowed=0 [ 575.806333] CPU: 0 PID: 29547 Comm: syz-executor7 Not tainted 4.17.0+ #16 [ 575.813286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.822643] Call Trace: [ 575.825245] dump_stack+0x185/0x1d0 [ 575.828869] dump_header+0x2cc/0x16f0 [ 575.832665] ? __msan_poison_alloca+0x15c/0x1d0 [ 575.837337] ? oom_kill_process+0x2e0/0x2160 [ 575.841753] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 575.847201] ? ___ratelimit+0x67f/0x760 [ 575.851185] oom_kill_process+0x341/0x2160 [ 575.855420] ? mem_cgroup_scan_tasks+0x289/0x610 [ 575.860189] out_of_memory+0x1700/0x1da0 [ 575.864259] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 575.869622] ? _cond_resched+0x8b/0xd0 [ 575.873523] mem_cgroup_oom_synchronize+0x1408/0x1760 [ 575.878708] ? mem_cgroup_oom_synchronize+0x1760/0x1760 [ 575.884093] pagefault_out_of_memory+0x57/0x110 [ 575.888760] mm_fault_error+0x460/0x7c0 [ 575.892753] __do_page_fault+0x1274/0x1a10 [ 575.897009] do_page_fault+0xb7/0x250 [ 575.900827] ? page_fault+0x8/0x30 [ 575.904366] page_fault+0x1e/0x30 [ 575.907810] RIP: 0033:0x407198 [ 575.910994] RSP: 002b:0000000000a3ea68 EFLAGS: 00010246 [ 575.916375] RAX: 0000000000000001 RBX: 0000000000000013 RCX: 000000000040fb10 [ 575.923638] RDX: 0000000000000038 RSI: 0000000000000000 RDI: 00000000000000fa [ 575.930900] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 575.938158] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000000003e0 [ 575.945419] R13: 00000000004119c0 R14: 0000000000a3f160 R15: 0000000000000000 [ 575.953282] Task in /syz7 killed as a result of limit of /syz7 [ 575.959335] memory: usage 1196kB, limit 0kB, failcnt 164 [ 575.964827] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 575.971634] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 575.977814] Memory cgroup stats for /syz7: cache:64KB rss:48KB rss_huge:0KB shmem:48KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 575.997676] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 576.006464] [29547] 0 29547 17553 8392 118784 0 0 syz-executor7 [ 576.015336] Memory cgroup out of memory: Kill process 29547 (syz-executor7) score 8421000 or sacrifice child [ 576.025372] Killed process 29547 (syz-executor7) total-vm:70212kB, anon-rss:80kB, file-rss:33488kB, shmem-rss:0kB 00:17:30 executing program 7: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x400000890c, &(0x7f0000000000)="85b9a0a551d086b440130082726a62314e30602caedf1e3e8fbb53eb5ab024269361d258492ad1557102c164a06c723c2d56205cc9") 00:17:30 executing program 0 (fault-call:5 fault-nth:26): set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0xff9) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) 00:17:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000000c0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_int(r1, 0x29, 0xcf, &(0x7f0000000080), &(0x7f0000000100)=0x4) 00:17:30 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) accept4$unix(r1, 0x0, &(0x7f0000000000), 0x0) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x40, 0x2) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000001c0)=""/177, &(0x7f0000000280)=0xb1) shutdown(r0, 0x2) 00:17:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='/dev/ptmx\x00'}, 0x10) r2 = accept$inet(r1, &(0x7f0000000100)={0x0, 0x0, @loopback}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x1}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000200)={r3, 0x4, 0x2, 0x6, 0x3, 0x9}, &(0x7f0000000240)=0x14) pread64(r0, &(0x7f0000000080)=""/94, 0x5e, 0xf) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000040)={0xfffffffffffffffb, 0xe7e, 0x7}) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:17:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de", 0x72) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:17:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0}) fcntl$setlease(r1, 0x400, 0x0) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) shutdown(r0, 0x0) 00:17:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x1, 0x0, 0x0) [ 576.230975] FAULT_INJECTION: forcing a failure. [ 576.230975] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 576.242824] CPU: 0 PID: 29842 Comm: syz-executor0 Not tainted 4.17.0+ #16 [ 576.249748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.259096] Call Trace: [ 576.261689] dump_stack+0x185/0x1d0 [ 576.265324] should_fail+0x87b/0xab0 [ 576.269048] __alloc_pages_nodemask+0x600/0x5cc0 [ 576.273805] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 576.279170] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 576.284623] ? get_page_from_freelist+0xacd1/0xb7b0 [ 576.289649] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 576.295095] ? __save_stack_trace+0x90d/0xb00 [ 576.299612] kmsan_alloc_meta_for_pages+0x109/0x3b0 [ 576.304632] ? alloc_pages_vma+0xcc6/0x17f0 [ 576.308952] ? shmem_alloc_and_acct_page+0x6f0/0x1020 [ 576.314141] ? shmem_getpage_gfp+0x3991/0x59c0 [ 576.318726] ? splice_direct_to_actor+0x4cb/0x1040 [ 576.323656] ? do_sendfile+0x107b/0x1e40 [ 576.327716] ? __x64_sys_sendfile64+0x218/0x390 [ 576.332386] ? do_syscall_64+0x15b/0x230 [ 576.336450] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 576.341816] ? update_curr+0x48/0x10a0 [ 576.345700] ? check_preempt_wakeup+0xbea/0x1550 [ 576.350463] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 576.355831] ? update_curr+0x107/0x10a0 [ 576.359808] ? kmsan_set_origin_inline+0x6b/0x120 [ 576.364659] kmsan_alloc_page+0x82/0xe0 [ 576.368634] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 576.373392] ? kmsan_set_origin_inline+0x6b/0x120 [ 576.378236] ? __msan_poison_alloca+0x15c/0x1d0 [ 576.382905] ? kmem_cache_alloc+0x6c7/0xb70 [ 576.387229] ? memcg_kmem_put_cache+0x40/0x290 [ 576.391808] ? kmem_cache_alloc+0x6c7/0xb70 [ 576.396136] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 576.401509] ? kmem_cache_alloc+0xa97/0xb70 [ 576.405838] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 576.411201] ? __bitmap_intersects+0x173/0x300 [ 576.415792] alloc_pages_vma+0xcc6/0x17f0 [ 576.419958] shmem_alloc_and_acct_page+0x6f0/0x1020 [ 576.424984] ? find_lock_entry+0xc8/0x720 [ 576.429137] ? find_get_entry+0x7ef/0x820 [ 576.433291] ? shmem_getpage_gfp+0x61f/0x59c0 [ 576.437790] ? shmem_getpage_gfp+0x61f/0x59c0 [ 576.442303] shmem_getpage_gfp+0x3991/0x59c0 [ 576.446722] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 576.451394] ? __wake_up_common_lock+0x10c/0x370 [ 576.456155] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 576.461608] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 576.466974] ? vmalloc_to_page+0x50b/0x630 [ 576.471220] ? _cond_resched+0x3c/0xd0 [ 576.475117] shmem_file_read_iter+0x508/0x1180 [ 576.479719] ? shmem_file_llseek+0xd80/0xd80 [ 576.484135] generic_file_splice_read+0x5d7/0x900 [ 576.488987] ? splice_shrink_spd+0x100/0x100 [ 576.493397] splice_direct_to_actor+0x4cb/0x1040 [ 576.498157] ? do_splice_direct+0x540/0x540 [ 576.502487] do_splice_direct+0x335/0x540 [ 576.506642] ? security_file_permission+0x1f0/0x480 [ 576.511663] do_sendfile+0x107b/0x1e40 [ 576.515562] __x64_sys_sendfile64+0x218/0x390 [ 576.520065] ? __ia32_sys_sendfile+0x160/0x160 [ 576.524645] do_syscall_64+0x15b/0x230 00:17:30 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 00:17:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/142, 0x8e) accept4$packet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x800) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x70, "c6a0d35a54e8c715829459f475818d3b2891c733c5d27da5d35d178d36710139d743827297a0837ef1eeaf4918ed4d4be2febb0bbf1f6554d18e25b4d7657f86ac0acf07e8481a7ac544c72cc0dc929a6813c57353be6e292b86f004b68e6aa737d9804083478ed24ecdb7a1c38359c4"}, &(0x7f00000005c0)=0x78) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000600)={r4, 0x7}, &(0x7f0000000640)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) fremovexattr(r3, &(0x7f00000004c0)=@random={'user.', 'mime_typemime_type*proc\\GPLeth0[eth1keyringuser\x00'}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x9c21, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}}) fanotify_init(0x20, 0x800) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000380)="8f77fa25e1dfc3f0dab766869ddd0ea8f5408f5af14aa68b4661cce8448b0e8cd399c1f2880ff842b56cada7e0fbb44142a2dc8aebc2fc6ee218a9f7d09ffe4c7a736af7fe50bd7b63f1c603e8323e8d7bfc90157c6b6fe76c45636b496537b809afee8264828a7b763376d0022cd1f284de8fd004150016998acefb3278dfaae18ff3ac8a", 0x85) connect$rds(r2, &(0x7f0000000500)={0x2, 0x4e23}, 0x10) 00:17:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 00:17:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x400000000000007, &(0x7f0000000000), &(0x7f0000000380), 0x8, &(0x7f0000000100)) [ 576.528538] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 576.533723] RIP: 0033:0x455ab9 [ 576.536909] RSP: 002b:00007f2d6e561c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 576.544613] RAX: ffffffffffffffda RBX: 00007f2d6e5626d4 RCX: 0000000000455ab9 [ 576.551877] RDX: 00000000200ddff8 RSI: 0000000000000014 RDI: 0000000000000013 [ 576.559142] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 576.566830] R10: 0000000102002f01 R11: 0000000000000246 R12: 0000000000000015 [ 576.574096] R13: 00000000004c0b3b R14: 00000000004d0978 R15: 000000000000001a [ 576.653902] ------------[ cut here ]------------ [ 576.658705] kmsan_get_shadow_address_inline(fffffe0000016f08, 8, 1) [ 576.665165] WARNING: CPU: 0 PID: 29858 at mm/kmsan/kmsan_instr.c:153 kmsan_get_shadow_address_inline+0x192/0x2e0 [ 576.675470] Kernel panic - not syncing: panic_on_warn set ... [ 576.675470] [ 576.682836] CPU: 0 PID: 29858 Comm: syz-executor4 Not tainted 4.17.0+ #16 [ 576.689779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.699126] Call Trace: [ 576.701707] <#DB> [ 576.703863] dump_stack+0x185/0x1d0 [ 576.707495] panic+0x3d0/0x990 [ 576.710704] __warn+0x40f/0x580 [ 576.713985] ? kmsan_get_shadow_address_inline+0x192/0x2e0 [ 576.719616] report_bug+0x72a/0x880 [ 576.723248] ? kmsan_get_shadow_address_inline+0x192/0x2e0 [ 576.728896] ? kmsan_get_shadow_address_inline+0x192/0x2e0 [ 576.730691] IPVS: ftp: loaded support on port[0] = 21 [ 576.734521] do_error_trap+0x1c1/0x620 [ 576.734537] ? vprintk_func+0x517/0x700 [ 576.734553] ? __msan_get_context_state+0x20/0xf0 [ 576.734573] do_invalid_op+0x46/0x50 [ 576.734588] invalid_op+0x14/0x20 [ 576.734603] RIP: 0010:kmsan_get_shadow_address_inline+0x192/0x2e0 [ 576.734610] RSP: 0018:fffffe0000016da8 EFLAGS: 00010082 [ 576.734620] RAX: 0000000000000037 RBX: 0000000000000001 RCX: 0000000000000000 [ 576.734628] RDX: ffffc9000259f000 RSI: 0000000000001023 RDI: 0000000000001024 [ 576.734635] RBP: fffffe0000016df0 R08: 0000000000000000 R09: 0000000000000001 [ 576.734643] R10: 0000000000000000 R11: ffffffff86576dc0 R12: 0000000000000000 00:17:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x1, 0x0) accept$inet6(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000200)=0x1c) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x101000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x80480, 0x0) prctl$getname(0x10, &(0x7f00000000c0)=""/91) [ 576.734650] R13: 0000000000000001 R14: 0000000000000008 R15: ffff88009eb90000 [ 576.734667] ? write_ext_msg+0x950/0x950 [ 576.734682] ? kmsan_get_shadow_address_inline+0x192/0x2e0 [ 576.734704] __msan_poison_alloca+0xa7/0x1d0 [ 576.821575] ? debug+0x28/0x50 [ 576.824772] do_debug+0x5b/0x800 [ 576.828144] debug+0x28/0x50 [ 576.831167] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 576.836785] RSP: 0018:ffff8800a47dfd48 EFLAGS: 00000202 [ 576.842146] RAX: ffffffff83ffc1f2 RBX: 0000000020000000 RCX: 0000000000000004 00:17:30 executing program 5: r0 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0x73, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}, @in6={0xa, 0x4e22, 0x1, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x20}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = geteuid() r3 = getgid() fchownat(r0, &(0x7f0000000100)='./file0\x00', r2, r3, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x2c, "3928d807160e16226ee5db3bd3d5baa575eb47b356224b5ef4df15e389c40e5ce011052b65ad719748a8c18f"}, &(0x7f0000000180)=0x34) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYRES32=r4, @ANYBLOB="ff0fc30010badb97888f923ce9caa835b5061146ad37e1965cdc6b66d071c6aa3dd31a1efadb292c2b503c9798ce82226dc79946289751219fb37e2b977ca657982cde7e8f5975756b589a0043faea508b64d39399125b0ddf7221794f68fc57db76e8862271448ee5c896335cd7755936c9e1efaffe7d4f78ff44b56b432eeb40ffc782cf47a9f1fb24ca82b5b55173e14ea066a38330732f78b49276e49329dcdeba885216814395ff275ad33b2ffab359dad68635022c23ee93b04b"], 0xcb) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000300)=0x100000000) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80) [ 576.849415] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffff8800a47dfdd8 [ 576.856686] RBP: ffff8800a47dfdc8 R08: 0000000000000000 R09: 0000000000000002 [ 576.863958] R10: 0000000000000000 R11: ffffffff8127cee0 R12: ffff8800a47dfd50 [ 576.871225] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000020 [ 576.878508] ? __ia32_sys_sigprocmask+0x110/0x110 [ 576.883356] ? _copy_from_user+0xd2/0x200 [ 576.887497] [ 576.889742] ? _copy_from_user+0x10c/0x200 [ 576.893988] __se_sys_rt_sigaction+0x133/0x3e0 [ 576.898574] ? syscall_return_slowpath+0xe9/0x710 [ 576.903423] __x64_sys_rt_sigaction+0x11e/0x170 [ 576.908107] ? __ia32_sys_sigprocmask+0x110/0x110 [ 576.912951] do_syscall_64+0x15b/0x230 [ 576.916847] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 576.922032] RIP: 0033:0x455ab9 [ 576.925218] RSP: 002b:00007f96f796cc68 EFLAGS: 00000246 ORIG_RAX: 000000000000000d [ 576.932927] RAX: ffffffffffffffda RBX: 00007f96f796d6d4 RCX: 0000000000455ab9 [ 576.940194] RDX: 0000000020000380 RSI: 0000000020000000 RDI: 0400000000000007 [ 576.947470] RBP: 000000000072bea0 R08: 0000000020000100 R09: 0000000000000000 [ 576.954736] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 576.962000] R13: 00000000004c092d R14: 00000000004d0600 R15: 0000000000000000 [ 576.969681] Dumping ftrace buffer: [ 576.973209] (ftrace buffer empty) [ 576.976896] Kernel Offset: disabled [ 576.980498] Rebooting in 86400 seconds..