race(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x8}, 0x8000000200036158, 0x800027b, 0x0, 0x5}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0xb, 0x80000, 0x8) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 638.619127] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 638.652164] syz-executor.5 cpuset=syz5 [ 638.658336] Node 0 active_anon:1324212kB inactive_anon:832kB active_file:8692kB inactive_file:5908kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220688kB dirty:672kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 589824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 638.667318] CIFS VFS: Device name not specified. [ 638.716837] mems_allowed=0-1 [ 638.738110] CPU: 0 PID: 31599 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 638.746046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.755418] Call Trace: [ 638.758031] dump_stack+0x197/0x210 [ 638.761714] warn_alloc.cold+0x7b/0x173 [ 638.765722] ? zone_watermark_ok_safe+0x260/0x260 [ 638.770591] ? compaction_deferred+0x16a/0x3b0 [ 638.775210] ? try_to_compact_pages+0x44/0xae0 [ 638.779831] __alloc_pages_slowpath+0x2214/0x2870 [ 638.784719] ? warn_alloc+0x110/0x110 [ 638.788543] ? __lock_is_held+0xb6/0x140 [ 638.792623] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.798286] ? should_fail+0x14d/0x85c [ 638.802196] ? __isolate_free_page+0x4c0/0x4c0 [ 638.805971] CIFS VFS: Malformed UNC in devname. [ 638.806797] ? __might_sleep+0x95/0x190 [ 638.806822] __alloc_pages_nodemask+0x617/0x750 [ 638.806844] ? __alloc_pages_slowpath+0x2870/0x2870 [ 638.806869] ? fs_reclaim_acquire+0x20/0x20 [ 638.829524] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.835098] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 638.840943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.842437] Node 0 DMA free:10416kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 638.846537] alloc_pages_current+0x107/0x210 [ 638.846562] ion_page_pool_alloc+0x17f/0x270 [ 638.846583] ion_system_heap_allocate+0x154/0xa90 [ 638.886730] ? ion_system_heap_free+0x250/0x250 [ 638.891429] ? ion_alloc+0x306/0x900 [ 638.895249] ion_alloc+0x29b/0x900 [ 638.898827] ? ion_dma_buf_release+0x50/0x50 [ 638.903273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.908836] ? _copy_from_user+0xdd/0x150 [ 638.913026] ion_ioctl+0x17b/0x329 [ 638.916596] ? ion_alloc.cold+0x28/0x28 [ 638.920591] ? __might_sleep+0x95/0x190 [ 638.924594] ? ion_alloc.cold+0x28/0x28 [ 638.928596] do_vfs_ioctl+0xd5f/0x1380 [ 638.932509] ? selinux_file_ioctl+0x46c/0x5d0 [ 638.937028] ? selinux_file_ioctl+0x125/0x5d0 [ 638.941545] ? ioctl_preallocate+0x210/0x210 [ 638.945976] ? selinux_file_mprotect+0x620/0x620 [ 638.950770] ? iterate_fd+0x360/0x360 [ 638.954597] ? nsecs_to_jiffies+0x30/0x30 [ 638.958782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.962448] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 638.964339] ? security_file_ioctl+0x8d/0xc0 [ 638.964359] ksys_ioctl+0xab/0xd0 [ 638.964377] __x64_sys_ioctl+0x73/0xb0 [ 638.972632] Node 0 DMA32 free:70840kB min:36168kB low:45208kB high:54248kB active_anon:1322032kB inactive_anon:832kB active_file:8800kB inactive_file:5908kB unevictable:0kB writepending:672kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12224kB pagetables:18348kB bounce:0kB free_pcp:2172kB local_pcp:1252kB free_cma:0kB [ 638.973839] do_syscall_64+0xfd/0x620 [ 638.973860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.973875] RIP: 0033:0x45b399 [ 638.991626] lowmem_reserve[]: 0 0 1 1 1 [ 639.011088] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 639.011097] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 639.011110] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 639.011117] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 639.011125] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 639.011132] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 639.011140] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 639.150348] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 639.247978] lowmem_reserve[]: 0 0 0 0 0 [ 639.252346] Node 0 DMA: 1*4kB (E) 1*8kB (E) 2*16kB (U) 5*32kB (UE) 1*64kB (E) 3*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10380kB [ 639.295668] Node 0 DMA32: 578*4kB (UME) 334*8kB (UME) 125*16kB (UME) 916*32kB (UME) 17*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 37384kB [ 639.311062] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 639.323170] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 639.332954] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 639.341992] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 639.351414] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 639.360847] 3377 total pagecache pages [ 639.365375] 0 pages in swap cache [ 639.369241] Swap cache stats: add 0, delete 0, find 0/0 [ 639.375412] Free swap = 0kB [ 639.378864] Total swap = 0kB [ 639.382705] 1965979 pages RAM [ 639.386824] 0 pages HighMem/MovableOnly [ 639.391297] 341741 pages reserved [ 639.395349] 0 pages cma reserved 20:09:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xa, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027a}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:12 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f00000002c0)={0x80001, 0x0, [0x0, 0xffffffffffffffbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) ioctl$KVM_SET_CPUID2(r5, 0x4008ae90, &(0x7f0000000180)=ANY=[@ANYBLOB="050000000000000000000080000000000200000001000000810000000700000000020000000000000000000000000000010000400500000000000000ac0600007f000000090000001f00000000000000000000000000000000000040e4ffffb30600000001000080050000000000000002000000000000000000000000000000010000400400000001000000000007000000000000000000000000000000010000c003000000030000000600000000000000010000000700"/202]) ptrace(0x10, r2) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f00000000c0)={0x4, 0x5, 0xf, 0x4, 0x1f}) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x5}, 0x1c}}, 0x0) r9 = dup3(r6, r7, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r9, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:12 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xc, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 639.732384] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 639.747251] CIFS VFS: Device name not specified. [ 639.762545] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 639.762564] CIFS VFS: Malformed UNC in devname. [ 639.779390] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 639.785018] CPU: 1 PID: 31826 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 639.792922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.802401] Call Trace: [ 639.805017] dump_stack+0x197/0x210 [ 639.808676] warn_alloc.cold+0x7b/0x173 [ 639.812681] ? zone_watermark_ok_safe+0x260/0x260 [ 639.814320] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 639.817550] ? compaction_deferred+0x16a/0x3b0 [ 639.817573] ? try_to_compact_pages+0x44/0xae0 [ 639.817610] __alloc_pages_slowpath+0x2214/0x2870 [ 639.817642] ? warn_alloc+0x110/0x110 [ 639.817657] ? __lock_is_held+0xb6/0x140 [ 639.817674] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 639.817689] ? should_fail+0x14d/0x85c [ 639.817711] ? __isolate_free_page+0x4c0/0x4c0 [ 639.859162] ? __might_sleep+0x95/0x190 [ 639.863161] __alloc_pages_nodemask+0x617/0x750 [ 639.867863] ? __alloc_pages_slowpath+0x2870/0x2870 [ 639.872922] ? fs_reclaim_acquire+0x20/0x20 [ 639.877380] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 639.882943] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 639.888686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 639.894258] alloc_pages_current+0x107/0x210 [ 639.898708] ion_page_pool_alloc+0x17f/0x270 [ 639.903142] ion_system_heap_allocate+0x154/0xa90 [ 639.908009] ? ion_system_heap_free+0x250/0x250 [ 639.912812] ? ion_alloc+0x306/0x900 [ 639.916595] ion_alloc+0x29b/0x900 [ 639.920164] ? ion_dma_buf_release+0x50/0x50 [ 639.924591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 639.930152] ? _copy_from_user+0xdd/0x150 [ 639.934315] ion_ioctl+0x17b/0x329 [ 639.937887] ? ion_alloc.cold+0x28/0x28 [ 639.941887] ? __might_sleep+0x95/0x190 [ 639.945945] ? ion_alloc.cold+0x28/0x28 [ 639.949933] do_vfs_ioctl+0xd5f/0x1380 [ 639.953990] ? selinux_file_ioctl+0x46c/0x5d0 [ 639.958619] ? selinux_file_ioctl+0x125/0x5d0 [ 639.963139] ? ioctl_preallocate+0x210/0x210 [ 639.967566] ? selinux_file_mprotect+0x620/0x620 [ 639.972414] ? iterate_fd+0x360/0x360 [ 639.976244] ? nsecs_to_jiffies+0x30/0x30 [ 639.980418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 639.985981] ? security_file_ioctl+0x8d/0xc0 [ 639.990416] ksys_ioctl+0xab/0xd0 [ 639.993898] __x64_sys_ioctl+0x73/0xb0 [ 639.997811] do_syscall_64+0xfd/0x620 [ 640.001642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.006847] RIP: 0033:0x45b399 [ 640.010048] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:09:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xe, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x440802, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 640.029053] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 640.036791] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 640.044079] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 640.051397] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 640.058681] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 640.066064] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 640.074951] CPU: 0 PID: 31828 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 640.082867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.092237] Call Trace: [ 640.094853] dump_stack+0x197/0x210 [ 640.098613] warn_alloc.cold+0x7b/0x173 [ 640.098791] warn_alloc_show_mem: 1 callbacks suppressed [ 640.098795] Mem-Info: [ 640.102603] ? zone_watermark_ok_safe+0x260/0x260 [ 640.102623] ? compaction_deferred+0x16a/0x3b0 [ 640.102640] ? try_to_compact_pages+0x44/0xae0 [ 640.102672] __alloc_pages_slowpath+0x2214/0x2870 [ 640.102708] ? warn_alloc+0x110/0x110 [ 640.109461] active_anon:332586 inactive_anon:206 isolated_anon:0 [ 640.109461] active_file:1645 inactive_file:1250 isolated_file:0 [ 640.109461] unevictable:0 dirty:168 writeback:0 unstable:0 [ 640.109461] slab_reclaimable:16231 slab_unreclaimable:117895 [ 640.109461] mapped:54258 shmem:396 pagetables:4630 bounce:0 [ 640.109461] free:956811 free_pcp:651 free_cma:0 [ 640.110523] ? __lock_is_held+0xb6/0x140 [ 640.110546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 640.110563] ? should_fail+0x14d/0x85c [ 640.110581] ? __isolate_free_page+0x4c0/0x4c0 [ 640.110601] ? __might_sleep+0x95/0x190 [ 640.116612] Node 0 active_anon:1330336kB inactive_anon:816kB active_file:5792kB inactive_file:4384kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:216384kB dirty:668kB writeback:0kB shmem:1572kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 600064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 640.120142] __alloc_pages_nodemask+0x617/0x750 [ 640.120167] ? __alloc_pages_slowpath+0x2870/0x2870 [ 640.120188] ? fs_reclaim_acquire+0x20/0x20 [ 640.120208] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 640.125810] Node 0 DMA free:10444kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 640.129648] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 640.129666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 640.129692] alloc_pages_current+0x107/0x210 [ 640.134469] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 640.167312] ion_page_pool_alloc+0x17f/0x270 [ 640.167335] ion_system_heap_allocate+0x154/0xa90 [ 640.167360] ? ion_system_heap_free+0x250/0x250 [ 640.167377] ? ion_alloc+0x306/0x900 [ 640.167395] ion_alloc+0x29b/0x900 [ 640.167417] ? ion_dma_buf_release+0x50/0x50 [ 640.167439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 640.167455] ? _copy_from_user+0xdd/0x150 [ 640.167472] ion_ioctl+0x17b/0x329 [ 640.167488] ? ion_alloc.cold+0x28/0x28 [ 640.167513] ? __might_sleep+0x95/0x190 [ 640.172654] Node 0 DMA32 free:69496kB min:36168kB low:45208kB high:54248kB active_anon:1330336kB inactive_anon:816kB active_file:5620kB inactive_file:4388kB unevictable:0kB writepending:668kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12320kB pagetables:18520kB bounce:0kB free_pcp:2604kB local_pcp:1444kB free_cma:0kB [ 640.177133] ? ion_alloc.cold+0x28/0x28 [ 640.177155] do_vfs_ioctl+0xd5f/0x1380 [ 640.177173] ? selinux_file_ioctl+0x46c/0x5d0 [ 640.177192] ? selinux_file_ioctl+0x125/0x5d0 [ 640.181565] lowmem_reserve[]: 0 0 1 1 1 [ 640.185660] ? ioctl_preallocate+0x210/0x210 [ 640.185677] ? selinux_file_mprotect+0x620/0x620 [ 640.185699] ? iterate_fd+0x360/0x360 [ 640.185717] ? nsecs_to_jiffies+0x30/0x30 [ 640.185740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 640.185762] ? security_file_ioctl+0x8d/0xc0 [ 640.185778] ksys_ioctl+0xab/0xd0 [ 640.185796] __x64_sys_ioctl+0x73/0xb0 [ 640.185813] do_syscall_64+0xfd/0x620 [ 640.185834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.190841] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 640.218123] RIP: 0033:0x45b399 [ 640.218140] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 640.218149] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:09:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0xff, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}, 0x208e0, 0x3, 0x8, 0x0, 0x0, 0x7}, 0x0, 0xb, r2, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r4 = getpid() rt_tgsigqueueinfo(0x0, r4, 0x0, &(0x7f0000000200)) ptrace(0x10, r4) ptrace(0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x5}, 0x1c}}, 0x0) r9 = dup3(r5, r7, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r9, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x1}, 0x8000000200036158, 0x800027b, 0x0, 0x5}, r4, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 640.218163] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 640.218171] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 640.218180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 640.218188] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 640.218196] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:09:13 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r7 = socket(0x2, 0x1000000000000002, 0x0) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf9f4668c3543"], 0x35) setsockopt$inet6_udp_int(r7, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r8, 0x0, 0xffff, 0x9) sendto$inet(r7, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r7, r8, 0x0, 0x10001) ioctl$VIDIOC_ENUM_FRAMESIZES(r8, 0xc02c564a, &(0x7f00000000c0)={0x2, 0x30385056, 0x3, @discrete={0x7ff, 0xc0000000}}) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xf, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 640.698230] lowmem_reserve[]: 0 0 0 0 0 [ 640.703003] Node 0 DMA: 2*4kB (UE) 2*8kB (UE) 2*16kB (U) 5*32kB (UE) 2*64kB (UE) 3*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10456kB 20:09:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$P9_RREADDIR(r1, &(0x7f0000000180)={0xa6, 0x29, 0x2, {0xb99d, [{{0x8, 0x4, 0x5}, 0x9, 0xd8, 0x7, './file0'}, {{0x4, 0x3, 0x6}, 0x19fef7d5, 0x9, 0x7, './file0'}, {{0x2, 0x0, 0x3}, 0x8, 0x6d, 0x7, './file0'}, {{0x1, 0x3, 0x1}, 0x8, 0x0, 0x7, './file0'}, {{0x10, 0x3, 0x5}, 0x7, 0x6, 0x7, './file0'}]}}, 0xa6) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 640.778682] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 640.791959] Node 0 DMA32: 1329*4kB (UE) 2112*8kB (UE) 775*16kB (UE) 902*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 63476kB [ 640.817862] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 640.834803] CPU: 1 PID: 32058 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 640.842744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.852114] Call Trace: [ 640.854736] dump_stack+0x197/0x210 [ 640.856872] CIFS VFS: Device name not specified. [ 640.858404] warn_alloc.cold+0x7b/0x173 [ 640.858427] ? zone_watermark_ok_safe+0x260/0x260 [ 640.858446] ? compaction_deferred+0x16a/0x3b0 [ 640.858469] ? try_to_compact_pages+0x44/0xae0 [ 640.858504] __alloc_pages_slowpath+0x2214/0x2870 [ 640.858544] ? warn_alloc+0x110/0x110 [ 640.865874] CIFS VFS: Malformed UNC in devname. [ 640.867290] ? __lock_is_held+0xb6/0x140 [ 640.867314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 640.867331] ? should_fail+0x14d/0x85c [ 640.867353] ? __isolate_free_page+0x4c0/0x4c0 [ 640.867371] ? __might_sleep+0x95/0x190 [ 640.867391] __alloc_pages_nodemask+0x617/0x750 [ 640.867411] ? __alloc_pages_slowpath+0x2870/0x2870 [ 640.867430] ? fs_reclaim_acquire+0x20/0x20 [ 640.867447] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 640.867464] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 640.867482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 640.948056] alloc_pages_current+0x107/0x210 [ 640.952498] ion_page_pool_alloc+0x17f/0x270 [ 640.956933] ion_system_heap_allocate+0x154/0xa90 [ 640.961814] ? ion_system_heap_free+0x250/0x250 [ 640.966516] ? ion_alloc+0x306/0x900 [ 640.970273] ion_alloc+0x29b/0x900 [ 640.973844] ? ion_dma_buf_release+0x50/0x50 [ 640.978291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 640.983957] ? _copy_from_user+0xdd/0x150 [ 640.988132] ion_ioctl+0x17b/0x329 [ 640.991701] ? ion_alloc.cold+0x28/0x28 [ 640.995712] ? __might_sleep+0x95/0x190 [ 640.999725] ? ion_alloc.cold+0x28/0x28 [ 641.003837] do_vfs_ioctl+0xd5f/0x1380 [ 641.007748] ? selinux_file_ioctl+0x46c/0x5d0 [ 641.012274] ? selinux_file_ioctl+0x125/0x5d0 [ 641.016804] ? ioctl_preallocate+0x210/0x210 [ 641.021256] ? selinux_file_mprotect+0x620/0x620 [ 641.026145] ? iterate_fd+0x360/0x360 [ 641.030105] ? nsecs_to_jiffies+0x30/0x30 [ 641.034293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 641.040067] ? security_file_ioctl+0x8d/0xc0 [ 641.044501] ksys_ioctl+0xab/0xd0 [ 641.047992] __x64_sys_ioctl+0x73/0xb0 [ 641.051909] do_syscall_64+0xfd/0x620 [ 641.055782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.061023] RIP: 0033:0x45b399 [ 641.064236] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 641.083260] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 641.091019] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 641.098392] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 641.105676] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 641.112956] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 641.120427] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:09:14 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x7f}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, &(0x7f0000000200)) ptrace(0x10, r1) ptrace(0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r3, 0x5}, 0x1c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r2, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r1, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x1) r8 = socket$inet(0x2, 0x3, 0xc4) umount2(&(0x7f0000000300)='./file0\x00', 0x4) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000240)='syz_tun\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) 20:09:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x10, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SG_GET_REQUEST_TABLE(r4, 0x2286, &(0x7f0000000180)) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x88000) getsockopt$netlink(r5, 0x10e, 0x5, &(0x7f0000000100)=""/2, &(0x7f0000000340)=0x2) [ 641.202436] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 641.232066] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 641.272575] warn_alloc_show_mem: 1 callbacks suppressed [ 641.272581] Mem-Info: [ 641.284275] active_anon:332092 inactive_anon:207 isolated_anon:0 [ 641.284275] active_file:1945 inactive_file:2042 isolated_file:0 [ 641.284275] unevictable:0 dirty:38 writeback:24 unstable:0 [ 641.284275] slab_reclaimable:16237 slab_unreclaimable:118041 [ 641.284275] mapped:55002 shmem:397 pagetables:4607 bounce:0 [ 641.284275] free:955576 free_pcp:450 free_cma:0 [ 641.309323] CIFS VFS: Device name not specified. [ 641.319457] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 641.349305] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 641.382476] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 641.387647] CIFS VFS: Malformed UNC in devname. [ 641.411364] 4488 total pagecache pages [ 641.425158] 0 pages in swap cache [ 641.431953] Swap cache stats: add 0, delete 0, find 0/0 [ 641.439469] Free swap = 0kB [ 641.445361] Total swap = 0kB [ 641.449370] 1965979 pages RAM [ 641.454169] 0 pages HighMem/MovableOnly [ 641.459928] 341741 pages reserved [ 641.464677] 0 pages cma reserved 20:09:14 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:14 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000001c0)=""/246) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r1, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r7 = getpid() rt_tgsigqueueinfo(0x0, r7, 0x0, 0x0) ptrace(0x10, r7) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r9, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e1f, 0xb58, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}, 0x3, 0x7, 0x401, 0x5, 0x12, 0x0, 0xfc}, &(0x7f0000000300)=0x9c) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000440)={r10, 0x400}, &(0x7f0000000480)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r8, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r12, 0x5}, 0x1c}}, 0x0) dup3(r8, r11, 0x0) 20:09:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() r3 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r3) rt_tgsigqueueinfo(0x0, r3, 0x0, &(0x7f0000000200)={0x3}) ptrace(0x10, r2) ptrace(0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) r8 = dup3(r4, r6, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x60, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 641.535298] Node 0 active_anon:1324100kB inactive_anon:824kB active_file:7092kB inactive_file:7752kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:219368kB dirty:148kB writeback:96kB shmem:1584kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 595968kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 641.660583] Node 0 DMA free:10456kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 641.724718] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 641.730477] Node 0 DMA32 free:66516kB min:36168kB low:45208kB high:54248kB active_anon:1328528kB inactive_anon:820kB active_file:7376kB inactive_file:7424kB unevictable:0kB writepending:316kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12256kB pagetables:18464kB bounce:0kB free_pcp:1016kB local_pcp:376kB free_cma:0kB [ 641.754749] CIFS VFS: Device name not specified. [ 641.767593] lowmem_reserve[]: 0 0 1 1 1 [ 641.772151] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 641.808329] CIFS VFS: Malformed UNC in devname. [ 641.843500] lowmem_reserve[]: 0 0 0 0 0 [ 641.850456] Node 0 DMA: 2*4kB (UE) 3*8kB (UE) 2*16kB (U) 5*32kB (UE) 2*64kB (UE) 3*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10464kB [ 641.930182] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 641.975724] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 641.977737] Node 0 DMA32: 962*4kB (UE) 2457*8kB (UE) 812*16kB (UE) 904*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 65424kB [ 641.981296] CPU: 1 PID: 32400 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 642.002681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.012051] Call Trace: [ 642.014667] dump_stack+0x197/0x210 [ 642.018332] warn_alloc.cold+0x7b/0x173 [ 642.022346] ? zone_watermark_ok_safe+0x260/0x260 [ 642.027209] ? __lock_is_held+0xb6/0x140 [ 642.029382] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 642.031315] __alloc_pages_slowpath+0x2214/0x2870 [ 642.031350] ? warn_alloc+0x110/0x110 [ 642.044118] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 642.046950] ? __lock_is_held+0xb6/0x140 [ 642.046972] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 642.046987] ? should_fail+0x14d/0x85c [ 642.047006] ? __isolate_free_page+0x4c0/0x4c0 [ 642.047026] ? __might_sleep+0x95/0x190 [ 642.047047] __alloc_pages_nodemask+0x617/0x750 [ 642.047063] ? retint_kernel+0x2d/0x2d [ 642.047088] ? __alloc_pages_slowpath+0x2870/0x2870 [ 642.047108] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 642.051171] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 642.059755] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 642.059772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.059793] alloc_pages_current+0x107/0x210 [ 642.059814] ion_page_pool_alloc+0x17f/0x270 [ 642.059833] ion_system_heap_allocate+0x154/0xa90 [ 642.059855] ? ion_system_heap_free+0x250/0x250 [ 642.059870] ? ion_alloc+0x306/0x900 [ 642.059887] ion_alloc+0x29b/0x900 [ 642.059909] ? ion_dma_buf_release+0x50/0x50 [ 642.059929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 642.059942] ? _copy_from_user+0xdd/0x150 [ 642.059963] ion_ioctl+0x17b/0x329 [ 642.065644] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 642.069660] ? ion_alloc.cold+0x28/0x28 [ 642.069685] ? __might_sleep+0x95/0x190 [ 642.069700] ? ion_alloc.cold+0x28/0x28 [ 642.069718] do_vfs_ioctl+0xd5f/0x1380 [ 642.069735] ? selinux_file_ioctl+0x46c/0x5d0 [ 642.069751] ? selinux_file_ioctl+0x125/0x5d0 [ 642.069769] ? ioctl_preallocate+0x210/0x210 [ 642.069786] ? selinux_file_mprotect+0x620/0x620 [ 642.069808] ? iterate_fd+0x360/0x360 [ 642.069825] ? nsecs_to_jiffies+0x30/0x30 [ 642.069851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.074334] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 642.078352] ? security_file_ioctl+0x8d/0xc0 [ 642.078375] ksys_ioctl+0xab/0xd0 [ 642.078393] __x64_sys_ioctl+0x73/0xb0 [ 642.078410] do_syscall_64+0xfd/0x620 [ 642.078430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.078441] RIP: 0033:0x45b399 [ 642.078457] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 642.078464] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 642.078478] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 642.078485] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 642.078497] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 642.083768] 4660 total pagecache pages [ 642.087190] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 642.087201] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:09:15 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xf0, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000180)={0x7fffffff, 0x0, 0x0, 'queue0\x00', 0x4}) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x1ec) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r3 = getpid() rt_tgsigqueueinfo(0x0, r3, 0x0, 0x0) ptrace(0x10, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, r6, 0x2, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x94}, 0x801) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) r8 = dup3(r4, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0x6}, 0x8000000200036158, 0x800027b}, r3, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getpid() rt_tgsigqueueinfo(0x0, r3, 0x0, &(0x7f0000000200)) ptrace(0x10, r3) ptrace(0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x400, 0x4000}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) r8 = dup3(r4, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0xef8}, 0x8000000200036158, 0x800027b}, r3, 0x200000000100000, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 642.328619] 0 pages in swap cache [ 642.332510] Swap cache stats: add 0, delete 0, find 0/0 [ 642.338226] Free swap = 0kB [ 642.341825] Total swap = 0kB [ 642.345251] 1965979 pages RAM [ 642.349332] 0 pages HighMem/MovableOnly [ 642.353763] 341741 pages reserved [ 642.357453] 0 pages cma reserved 20:09:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0xa, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000040)=0x9) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x300, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 642.613305] CIFS VFS: Device name not specified. [ 642.633070] CIFS VFS: Malformed UNC in devname. 20:09:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getpid() rt_tgsigqueueinfo(0x0, r3, 0x0, &(0x7f0000000200)) ptrace(0x10, r3) ptrace(0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000180)=0x60, 0x800) getsockname(r2, &(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000001c0)=0x80) r9 = dup3(r4, r8, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r9, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x5}, 'port0\x00', 0x20, 0x10006, 0x84, 0x1, 0xbd, 0x3f, 0x0, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r3, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:15 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x600, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x446801, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0x1, 0x3, 0x38, &(0x7f0000000040)="ed49f0ed7544fe022d2d9071fa77b463a412b9e6b46310500cad8575a316702c2c6482ed9789de0f3bdafb3687d72d41af5a915ebd4a4eb7"}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="b3a42107a30e558685d38d47435a8125ca76f9a28d995b7f64994c2cc2e6e7a93ceaa33513ea635a7edd016bf3bcec68a1d6dea7a6426c3c67dd6bf1c5cfc308f7e5b874650d85afca1dfb3001aa5d9015cc8205c0e12f105668475244c3306805686046495600f8e12a91f6ae4b4f6bd3796ae8970569c6c534474f134209279d2d0da82318d6a247f2fc03784124535486125655a6ae0749b81fd4e751dd98cc2771fddba12a51a2d2d0d08e834f94b687a73a6f0837e9fd0f9a0913943a34846390975c54947cb310a0cdfa84613ffc8fad3c8d0ad4", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$NFT_MSG_GETOBJ(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, 0x13, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20004084) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 643.037252] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pig=353 comm=syz-executor.1 20:09:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6b6, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 643.113487] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 643.163224] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 643.190578] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 643.196758] CPU: 1 PID: 32619 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 643.204673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.214219] Call Trace: [ 643.216831] dump_stack+0x197/0x210 [ 643.220497] warn_alloc.cold+0x7b/0x173 [ 643.224498] ? zone_watermark_ok_safe+0x260/0x260 [ 643.229369] ? compaction_deferred+0x16a/0x3b0 [ 643.233978] ? try_to_compact_pages+0x44/0xae0 [ 643.238604] __alloc_pages_slowpath+0x2214/0x2870 [ 643.243509] ? warn_alloc+0x110/0x110 [ 643.247336] ? __lock_is_held+0xb6/0x140 [ 643.251434] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 643.257183] ? should_fail+0x14d/0x85c [ 643.261112] ? __isolate_free_page+0x4c0/0x4c0 [ 643.265726] ? __might_sleep+0x95/0x190 [ 643.269770] __alloc_pages_nodemask+0x617/0x750 [ 643.274474] ? __alloc_pages_slowpath+0x2870/0x2870 [ 643.279528] ? fs_reclaim_acquire+0x20/0x20 [ 643.283876] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 643.289436] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 643.293153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pig=353 comm=syz-executor.1 [ 643.295168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:09:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r3, 0x5}, 0x1c}}, 0x0) setsockopt$sock_void(r2, 0x1, 0x5a, 0x0, 0x0) r4 = getpid() setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@ccm_128={{0x303}, "f44d09a161915c33", "2f3f2b476f8af093f9fa79fc34fc8e11", "f9977dc7", "33073efb41678cb1"}, 0x28) rt_tgsigqueueinfo(0x0, r4, 0x0, 0x0) ptrace(0x10, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) r8 = dup3(r5, r6, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r4, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 643.295187] alloc_pages_current+0x107/0x210 [ 643.295211] ion_page_pool_alloc+0x17f/0x270 [ 643.321870] ion_system_heap_allocate+0x154/0xa90 [ 643.326885] ? ion_system_heap_free+0x250/0x250 [ 643.331590] ? ion_alloc+0x306/0x900 [ 643.335397] ion_alloc+0x29b/0x900 [ 643.338995] ? ion_dma_buf_release+0x50/0x50 [ 643.343446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 643.349028] ? _copy_from_user+0xdd/0x150 [ 643.353216] ion_ioctl+0x17b/0x329 [ 643.356788] ? ion_alloc.cold+0x28/0x28 [ 643.360821] ? __might_sleep+0x95/0x190 [ 643.364840] ? ion_alloc.cold+0x28/0x28 [ 643.368879] do_vfs_ioctl+0xd5f/0x1380 [ 643.372800] ? selinux_file_ioctl+0x46c/0x5d0 [ 643.377331] ? selinux_file_ioctl+0x125/0x5d0 [ 643.381889] ? ioctl_preallocate+0x210/0x210 [ 643.386321] ? selinux_file_mprotect+0x620/0x620 [ 643.391112] ? iterate_fd+0x360/0x360 [ 643.394937] ? nsecs_to_jiffies+0x30/0x30 [ 643.399117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.404680] ? security_file_ioctl+0x8d/0xc0 [ 643.409115] ksys_ioctl+0xab/0xd0 [ 643.412590] __x64_sys_ioctl+0x73/0xb0 [ 643.416506] do_syscall_64+0xfd/0x620 [ 643.420337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.425537] RIP: 0033:0x45b399 [ 643.428855] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.448037] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 643.455772] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 643.463061] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 643.470354] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 643.477651] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 643.484945] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 643.515344] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 643.542294] warn_alloc_show_mem: 1 callbacks suppressed [ 643.542299] Mem-Info: [ 643.550407] active_anon:330588 inactive_anon:207 isolated_anon:11 [ 643.550407] active_file:2179 inactive_file:1812 isolated_file:0 [ 643.550407] unevictable:0 dirty:86 writeback:0 unstable:0 [ 643.550407] slab_reclaimable:16154 slab_unreclaimable:118191 [ 643.550407] mapped:55083 shmem:397 pagetables:4587 bounce:0 [ 643.550407] free:953929 free_pcp:352 free_cma:0 [ 643.563696] CPU: 0 PID: 359 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 643.591933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.601314] Call Trace: [ 643.603940] dump_stack+0x197/0x210 [ 643.607599] warn_alloc.cold+0x7b/0x173 [ 643.607641] Node 0 active_anon:1322208kB inactive_anon:816kB active_file:7812kB inactive_file:6220kB unevictable:0kB isolated(anon):44kB isolated(file):0kB mapped:219488kB dirty:336kB writeback:0kB shmem:1572kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 593920kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 643.611717] ? zone_watermark_ok_safe+0x260/0x260 [ 643.611734] ? __lock_is_held+0xb6/0x140 [ 643.611770] __alloc_pages_slowpath+0x2214/0x2870 [ 643.654009] ? warn_alloc+0x110/0x110 [ 643.657835] ? __lock_is_held+0xb6/0x140 [ 643.661930] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 643.667496] ? should_fail+0x14d/0x85c [ 643.671415] ? __isolate_free_page+0x4c0/0x4c0 [ 643.676026] ? __might_sleep+0x95/0x190 [ 643.680065] __alloc_pages_nodemask+0x617/0x750 [ 643.684796] ? __alloc_pages_slowpath+0x2870/0x2870 [ 643.689841] ? fs_reclaim_acquire+0x20/0x20 [ 643.690276] Node 0 DMA free:10364kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:20kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 643.694176] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 643.694197] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 643.694210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.694230] alloc_pages_current+0x107/0x210 [ 643.694251] ion_page_pool_alloc+0x17f/0x270 [ 643.694271] ion_system_heap_allocate+0x154/0xa90 [ 643.694296] ? ion_system_heap_free+0x250/0x250 [ 643.694315] ? ion_alloc+0x306/0x900 [ 643.694335] ion_alloc+0x29b/0x900 [ 643.694357] ? ion_dma_buf_release+0x50/0x50 [ 643.694378] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 643.733559] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 643.737471] ? _copy_from_user+0xdd/0x150 [ 643.737492] ion_ioctl+0x17b/0x329 [ 643.737511] ? ion_alloc.cold+0x28/0x28 [ 643.742151] Node 0 DMA32 free:62220kB min:36168kB low:45208kB high:54248kB active_anon:1322028kB inactive_anon:820kB active_file:7916kB inactive_file:6352kB unevictable:0kB writepending:432kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12128kB pagetables:17952kB bounce:0kB free_pcp:1552kB local_pcp:1120kB free_cma:0kB [ 643.751202] ? __might_sleep+0x95/0x190 [ 643.751226] ? ion_alloc.cold+0x28/0x28 [ 643.756351] lowmem_reserve[]: 0 0 1 1 1 [ 643.759630] do_vfs_ioctl+0xd5f/0x1380 [ 643.759651] ? selinux_file_ioctl+0x46c/0x5d0 [ 643.759671] ? selinux_file_ioctl+0x125/0x5d0 [ 643.768053] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 643.773190] ? ioctl_preallocate+0x210/0x210 [ 643.773209] ? selinux_file_mprotect+0x620/0x620 [ 643.773230] ? iterate_fd+0x360/0x360 [ 643.773247] ? nsecs_to_jiffies+0x30/0x30 [ 643.773268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.773285] ? security_file_ioctl+0x8d/0xc0 [ 643.773303] ksys_ioctl+0xab/0xd0 [ 643.773320] __x64_sys_ioctl+0x73/0xb0 [ 643.773338] do_syscall_64+0xfd/0x620 [ 643.773360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.773371] RIP: 0033:0x45b399 [ 643.773387] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.773396] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 643.773408] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 643.773422] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 643.779245] lowmem_reserve[]: 0 0 0 0 0 [ 643.782718] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 643.782727] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 643.782737] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 644.058077] Node 0 DMA: 3*4kB (UE) 2*8kB (UE) 0*16kB 1*32kB (E) 3*64kB (UE) 3*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10364kB [ 644.084379] Node 0 DMA32: 355*4kB (UME) 1239*8kB (UME) 793*16kB (UME) 890*32kB (UME) 9*64kB (UM) 1*128kB (M) 0*256kB 1*512kB (U) 1*1024kB (M) 0*2048kB 0*4096kB = 54740kB [ 644.105503] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 644.117651] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 644.130488] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 644.139524] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 644.148719] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:09:17 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xa00, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='befs\x00', 0xc0ed0040, &(0x7f0000000100)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x80000001, 0x0) write$vhost_msg_v2(r3, &(0x7f00000001c0)={0x2, 0x0, {&(0x7f0000000180)=""/27, 0x1b, &(0x7f0000000840)=""/4096, 0x1, 0x2}}, 0x48) r5 = socket(0x1e, 0x4, 0x2) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r5, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) open_by_handle_at(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="24d2b730080000000114b51680d38ac60e798b2a381a70783ea01bbb4f55b81caa7d755246e3fdf4ecbbca7af841e6a33f90ce23a95667fba7f9358e6c49b2a6b7a16296ede35560b99b5274a91218d41808ffff836e98971019c5fedd3d34547d663e5b4ebe19fda8b073809f5a750645dcd8c4b6cd4f94b61dca3d533f94455d5354bce8a07eb6f09261655de7e0e788a5e09561fe5bf8e9bdd47c37ba8842d4223924f0009fc73d2e0c3fa0a26aaf95d8a3dfa070a7fb58ef8ef0ec09d7b06322ab851c9dc1cce7318d38fc"], 0x42) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x0, 0x77b}]}, 0xc, 0x6) 20:09:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r7, &(0x7f0000000040)={0x10}, 0x10) ioctl$DRM_IOCTL_CONTROL(r7, 0x40086414, &(0x7f00000000c0)={0x1}) 20:09:17 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 644.157586] 4416 total pagecache pages [ 644.161602] 0 pages in swap cache [ 644.165257] Swap cache stats: add 0, delete 0, find 0/0 [ 644.170651] Free swap = 0kB [ 644.173779] Total swap = 0kB [ 644.176816] 1965979 pages RAM [ 644.179922] 0 pages HighMem/MovableOnly [ 644.184008] 341741 pages reserved [ 644.187472] 0 pages cma reserved 20:09:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xc00, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 644.389882] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 644.471031] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 644.482355] CPU: 0 PID: 601 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 644.490108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.499476] Call Trace: [ 644.502091] dump_stack+0x197/0x210 [ 644.505749] warn_alloc.cold+0x7b/0x173 [ 644.509748] ? zone_watermark_ok_safe+0x260/0x260 [ 644.514876] ? compaction_deferred+0x16a/0x3b0 [ 644.519657] ? try_to_compact_pages+0x44/0xae0 [ 644.524287] __alloc_pages_slowpath+0x2214/0x2870 [ 644.529167] ? warn_alloc+0x110/0x110 [ 644.532996] ? __lock_is_held+0xb6/0x140 [ 644.537074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 644.542652] ? should_fail+0x14d/0x85c [ 644.546562] ? __isolate_free_page+0x4c0/0x4c0 [ 644.551164] ? __might_sleep+0x95/0x190 [ 644.555161] __alloc_pages_nodemask+0x617/0x750 [ 644.559851] ? retint_kernel+0x2d/0x2d [ 644.563761] ? __alloc_pages_slowpath+0x2870/0x2870 [ 644.568796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 644.574353] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 644.580087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.585640] alloc_pages_current+0x107/0x210 [ 644.590072] ion_page_pool_alloc+0x17f/0x270 [ 644.594532] ion_system_heap_allocate+0x154/0xa90 [ 644.599398] ? ion_system_heap_free+0x250/0x250 [ 644.604086] ? ion_alloc+0x306/0x900 [ 644.607819] ion_alloc+0x29b/0x900 [ 644.611378] ? ion_dma_buf_release+0x50/0x50 [ 644.615807] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 644.621353] ? _copy_from_user+0xdd/0x150 [ 644.625524] ion_ioctl+0x17b/0x329 [ 644.629097] ? ion_alloc.cold+0x28/0x28 [ 644.633091] ? __might_sleep+0x95/0x190 [ 644.637082] ? ion_alloc.cold+0x28/0x28 [ 644.641071] do_vfs_ioctl+0xd5f/0x1380 [ 644.644981] ? selinux_file_ioctl+0x46c/0x5d0 [ 644.649491] ? selinux_file_ioctl+0x125/0x5d0 [ 644.654011] ? ioctl_preallocate+0x210/0x210 [ 644.658432] ? selinux_file_mprotect+0x620/0x620 [ 644.663207] ? iterate_fd+0x360/0x360 [ 644.667024] ? nsecs_to_jiffies+0x30/0x30 [ 644.671201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.676759] ? security_file_ioctl+0x8d/0xc0 [ 644.681193] ksys_ioctl+0xab/0xd0 [ 644.684671] __x64_sys_ioctl+0x73/0xb0 [ 644.688580] do_syscall_64+0xfd/0x620 [ 644.692420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.697648] RIP: 0033:0x45b399 [ 644.700892] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:09:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f0000000440)='N\\\xe8J\x1c\xc2$\xd4F\xc4=\x13J+\x11\xd3Z`LY\x1f\x9d\xab\x92_G\x84\x03\xd2|\x8a\xbf\xa5t\xa0Z\xfa\x9b\x81\xdcJ\x1b\x92j\xabxh\xb1\xc7\xf6R\fCD`\x14>\xe0\x1d\xde\xf2\x84\xb9_R\x92Y\b\x1c\xa4J\x86\\@\xde%\xc4\x1a\f\x9b\x8f\x956\x80p\xad\xa6;\xd6\x03\x9a&1B\xe1\xc1\x1f\\\xc3\au\x1d\x91\xa4\xcc\xc0SXk\xc0\xfc\x90\x89m\x87\xf2\x99\xfc\xe1tw\x96\x02\xd3\xc3{5h4\xc9\x12\fu\xf6\xa6\x9apU^B=\xafW\x10G\x01\x15\xe0\xa4\b\xdc\"j`\x97{\xc2=37p\xb1I\xd7\xae') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 644.719859] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 644.727566] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 644.734842] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 644.742123] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 644.749405] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 644.756676] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:09:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xe00, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 644.778205] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 644.809632] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 644.825049] CPU: 1 PID: 608 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 644.833434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.842807] Call Trace: [ 644.845423] dump_stack+0x197/0x210 [ 644.849085] warn_alloc.cold+0x7b/0x173 [ 644.853086] ? zone_watermark_ok_safe+0x260/0x260 [ 644.857960] ? __lock_is_held+0xb6/0x140 [ 644.862071] __alloc_pages_slowpath+0x2214/0x2870 [ 644.866964] ? warn_alloc+0x110/0x110 [ 644.870783] ? __lock_is_held+0xb6/0x140 [ 644.874875] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 644.877203] warn_alloc_show_mem: 1 callbacks suppressed [ 644.877208] Mem-Info: [ 644.880426] ? should_fail+0x14d/0x85c [ 644.880451] ? __isolate_free_page+0x4c0/0x4c0 [ 644.880473] ? __might_sleep+0x95/0x190 [ 644.880493] __alloc_pages_nodemask+0x617/0x750 [ 644.888124] active_anon:330582 inactive_anon:208 isolated_anon:0 [ 644.888124] active_file:2392 inactive_file:1663 isolated_file:14 [ 644.888124] unevictable:0 dirty:115 writeback:0 unstable:0 [ 644.888124] slab_reclaimable:16053 slab_unreclaimable:118289 [ 644.888124] mapped:55004 shmem:397 pagetables:4668 bounce:0 [ 644.888124] free:954305 free_pcp:316 free_cma:0 [ 644.892149] ? __alloc_pages_slowpath+0x2870/0x2870 [ 644.892172] ? fs_reclaim_acquire+0x20/0x20 [ 644.892190] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 644.892209] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 644.892223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.892241] alloc_pages_current+0x107/0x210 [ 644.892262] ion_page_pool_alloc+0x17f/0x270 [ 644.892279] ion_system_heap_allocate+0x154/0xa90 [ 644.892304] ? ion_system_heap_free+0x250/0x250 [ 644.892320] ? ion_alloc+0x306/0x900 [ 644.892338] ion_alloc+0x29b/0x900 [ 644.892363] ? ion_dma_buf_release+0x50/0x50 [ 644.892385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 644.892402] ? _copy_from_user+0xdd/0x150 20:09:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xf00, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 644.900897] Node 0 active_anon:1322216kB inactive_anon:832kB active_file:8860kB inactive_file:5380kB unevictable:0kB isolated(anon):0kB isolated(file):56kB mapped:218800kB dirty:452kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 644.900972] ion_ioctl+0x17b/0x329 [ 644.906575] Node 0 DMA free:10448kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 644.939606] ? ion_alloc.cold+0x28/0x28 [ 644.939630] ? __might_sleep+0x95/0x190 [ 644.939649] ? ion_alloc.cold+0x28/0x28 [ 644.939667] do_vfs_ioctl+0xd5f/0x1380 [ 644.939686] ? selinux_file_ioctl+0x46c/0x5d0 [ 644.939702] ? selinux_file_ioctl+0x125/0x5d0 [ 644.939717] ? ioctl_preallocate+0x210/0x210 [ 644.939732] ? selinux_file_mprotect+0x620/0x620 [ 644.939750] ? iterate_fd+0x360/0x360 [ 644.939767] ? nsecs_to_jiffies+0x30/0x30 [ 644.939787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.939802] ? security_file_ioctl+0x8d/0xc0 [ 644.939817] ksys_ioctl+0xab/0xd0 [ 644.939836] __x64_sys_ioctl+0x73/0xb0 20:09:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x0, 0x800027b, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 644.946654] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 644.949179] do_syscall_64+0xfd/0x620 [ 644.949203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.949216] RIP: 0033:0x45b399 [ 644.949231] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 644.949239] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 644.949253] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 644.949261] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 644.949269] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 644.949278] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 644.949287] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 645.027995] CIFS VFS: Device name not specified. 20:09:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x3f00, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 645.109268] Node 0 DMA32 free:59212kB min:36168kB low:45208kB high:54248kB active_anon:1322416kB inactive_anon:832kB active_file:8360kB inactive_file:5292kB unevictable:0kB writepending:452kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12480kB pagetables:19008kB bounce:0kB free_pcp:1292kB local_pcp:320kB free_cma:0kB [ 645.157357] CIFS VFS: Malformed UNC in devname. [ 645.252676] lowmem_reserve[]: 0 0 1 1 1 [ 645.256736] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 20:09:18 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 645.336963] lowmem_reserve[]: 0 0 0 0 0 [ 645.341477] Node 0 DMA: 2*4kB (UE) 5*8kB (UE) 2*16kB (U) 2*32kB (UE) 3*64kB (UE) 3*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10448kB [ 645.371403] Node 0 DMA32: 168*4kB (UME) 1322*8kB (UME) 1187*16kB (UME) 887*32kB (UME) 5*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 58944kB 20:09:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x4000, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 645.439841] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB 20:09:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r3, 0x5}, 0x1c}}, 0x0) close(r2) write$FUSE_DIRENT(r1, &(0x7f0000000040)={0x10}, 0x10) ioctl$SNDRV_PCM_IOCTL_DRAIN(r1, 0x4144, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r4) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r7 = socket(0x1e, 0x4, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r7, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x100, r8, 0x25, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x14}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7ff}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x16}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="be397cece43e3d280dd4d4ed203c7ae2"}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}]}, 0x100}, 0x1, 0x0, 0x0, 0xc844}, 0x4000) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r7, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r6, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 645.515814] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 645.550906] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:09:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) dup3(r3, r5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x21, 0x801, 0x84, 0x1, 0xbd, 0x3f, 0x1, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 645.565276] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 645.608505] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:09:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x5865, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 645.652019] 4823 total pagecache pages [ 645.662110] 0 pages in swap cache [ 645.679941] Swap cache stats: add 0, delete 0, find 0/0 [ 645.710351] Free swap = 0kB [ 645.729472] Total swap = 0kB [ 645.748258] 1965979 pages RAM [ 645.761995] 0 pages HighMem/MovableOnly [ 645.779879] 341741 pages reserved [ 645.799670] 0 pages cma reserved [ 645.922007] CIFS VFS: Device name not specified. [ 645.945011] CIFS VFS: Malformed UNC in devname. 20:09:19 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) sendmmsg(r3, &(0x7f0000006a80)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e22, 0xb3a00000, @loopback, 0x2}}}, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)="25ef9684dcb8ab7c9e818879cab88654ae2c520cdd14e1abe691d9bf5f0e"}, {&(0x7f0000000180)="4a3cd5f3f416c7bb5374f6b0b88d1241196916453920019926d52d5b6c6b04bb2824ecc85a94cb4fa48d954add2019ed8e6563209bc25d403f61fbdb3baff3b928a8095de5c04a16166f6ebaa6784c2d7e46bad63fdde05a583fa133f91d03dd980838df0263d3a455d12c"}, {&(0x7f0000000200)="dd5a70e4fee3770c41a555d2bf9a3a2fbb5a893567ec709f41fe0bde53f9006b7fe32ebef4fcd5b60679ab9eede828b4777a90b84280d11bf03ad007e5b7c7d209369ffde86bf848829f108b00fe2992438606241607b686892b85e2c050c0cc235d76c5cb10ac9bbc72f6c9db0aedd91344000cf5ebae6856014fbb960221578fcaecc1db4316359861ddbfb0879e8c7475eba634248a79af70f17124c59aca1bb0b88a00920d14dd5d5c1466f129837f100a336cbaea8c5dcaf49ed59e09b4"}, {&(0x7f0000000340)="1d8c24ad2e79688dbf526c03044c2a961f17edaae26ae66bc518cf5370209e5b7646601701927d9941bf7d1fa3aacc345cb1ad15e5206ecc5ac6aaf0375f59c8af4880d55c8b809141be2123fae5fe913841994532704936452d7ab5fbd30b72bc2b6c643e9afd60071584ba95b4bf52c51f1bc86381cc39d3d8f380056b589c8ca2695d5187655589126f19c974f2bb71e5d731ce01d15f6da302727687a2507b0880ac4e186b67a6ef5d4cbf6292f7d583b01e50ead5fd"}, {&(0x7f00000002c0)="15d9d73949909c43b33ac69817e4c195adb4249189a1579dbefd891670ce4908ba"}, {&(0x7f0000000400)="54f637b2bd257a1f6e6aa10d6b8469a88036b98195fdc9771863208b94b461070912278c7b40aef390e1df209027d902203cfa45d02accfaf107890bf358b3787ca3fc2ccf55c9fcc02a2526c24cdb6bdb306a3a76debde6f290f2770b32e4c3354aa2eace167e4644f9b53215f4f2877eb477a215a1ab300e278b9b423de87464f458dc5ba272afaa31206929a8b4fbb37c19102daf55b06ccfc2bbfc06c332050d9c5ff8a8bdda0bda07d11083e20360d46ba5cc30f6dc3782cb3230f724e4d6b9545de3727457a3"}, {&(0x7f0000000500)="312ed110d7b7677820ee4d234aba9fefc8cba29050ebd2596624c99674eb2405d58d5367f28c106d5ea37496a0fd9b8867b7eac48f710d50e6419c9aa171cd729afdd0c5ee6afdee38465000022eba61da8fe2df6e4b46661c5270bf41f46d0d65a7f96214fefdd5f5d142feaf26e4007720f1c6c4fb80117b688caabaa18f289867cd9e1fb1c787a57ec6bb6de4efbff1defd93f6dcc3784e543c19fa58811cfa8a42eff7a1058d772be173e51a98bee6287eaaa50bd925d18e0939f061938fa08e677f937be203bfc689de75c30173d94a470f72fadd3112bf2deef2"}]}}, {{&(0x7f0000000680)=@ethernet={0x1}, 0x0, &(0x7f0000000800)=[{&(0x7f0000000700)="34d285f70970dcabb2a955410158b1881df5a4ef2d15f5b51d1853998f54bbaa9cd199bdd8043a44cd0224ccb7baebae2b5f3e5a847d8af55670069abde8f102694cdfa40b40e5f0f395f56ebfe508ca1fb26db552dba9a53575493e1fe812fc08447340e922a02041f6ebaa3c51b2b7a6f28b07203c21d9b5f2fc64b607286dfb1e1683e73ce142f3b0"}, {&(0x7f00000007c0)="bb695ae370bb92b49cb17a681c993e0e"}], 0x0, &(0x7f0000000840)=[{0x0, 0x116, 0x9d3b, "9e34260ef25b445a877ecab05d597518cc557d1ae416d05c924b011e2e80cd"}, {0x0, 0x11, 0x0, "9fe79f51a9509e89fb41796d87e75307e42290a7b25989c249089aeac4c0b4b6223fdc34530fd0a61f7fe4"}, {0x0, 0x10b, 0xfff, "605c84ea049aecfbf85b5f2a4c6be2ad89c0afa991e62c168a59aa75f4af3b020466dcbd3ac3668c00eec1e713517c0d6b577eed1a3b6148b09002f2cfff437bc2fcdd701ef027ed4446c55f3ac29fb5c23f4deae49dac76c07f5f89d22cb19440b61b1021a56ebb3377d7a96f0b988a75fc7246e154d3c3cd71c5874c6289809d9c592024eb103ba4d3cf041da054845209577ef923499f6041eb756c7f7fab9f206d46754547411e208c92459ccbfc20a163e170cceb263af5ca11167aabe6d80e49"}, {0x0, 0x10c, 0xccce, "cf973ac4b249d787ef9b68b1cc11dc48439dd0a105efb5f12696ea174c301f44302df85a"}]}}, {{&(0x7f00000009c0)=@ethernet={0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1f}}, 0x0, &(0x7f0000006c40)=[{&(0x7f0000000a40)}, {&(0x7f0000000a80)="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"}, {&(0x7f0000002900)="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"}, {&(0x7f0000001a80)="28eb630a5cd3b2564288a28abe3382922da87b624dfacdbe9b1fa1d71c8df926052f0c7b5cd3e76abbf1a09955ac1b8f94a1082dacaac03944cad024a2351f7da286b3d22003079f35b43fc8344624468724942647646c80f19f7b1dcb35aa9f241a6d365ed55c42124cd03bb56b0d44a3cc29184e1f3e4752d012cad9b843c10b058e945bc3a4d52d52b54a6831e4e11ab958608217b6bd225bdffacdd31f19c0f8bff706fd8b6be65f392dca29d43113ee9d421cf7a6ddbeecb8adb82e40aa0cba53193fbcace7127e7490855606199c53348d6721"}, {&(0x7f0000001b80)="300fc9ea9e5ccf049b65dd494beac5c09c2f1489045e5fc8f3bffeffc3dc91468ccfa94db05e941540d7bbacfd16f45f280bb8572535d6e520a0de90af02f297871c044f9d396e430eda672fb090f68d5b2d92812094ba0755aa"}, {&(0x7f0000001c00)="e815c1581dbede74a59695536c171012f7b1e75184f7192575185d1587852978ce083dc17609f54eae2ed1022dd02cf74ecf6a532500fee114a761d8aab420348ef95f673e7cb3e54bf6bbded08d432d81a8cdebaffa0aed62e2a1bfca59bd6260349a872a3afe7816a98e121d4dc33fabaf75222dd717a42e1760797f13ec9131ddec013ec97ddc1f57624a2ffa2ca94551fcccb3f17d9d9e08e4207586be32152d5d6b5749712256dd363a5ec09aa7ddc0a7f0174b2cd6562609f02c8a2ae52a33e369f3c369ec4e9133187aed86047b4e94b0e2e9"}, {&(0x7f0000006cc0)="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"}], 0x0, &(0x7f0000001e40)}}, {{&(0x7f0000002080)=@caif=@dgm={0x25, 0x2}, 0x0, &(0x7f0000002180)=[{&(0x7f0000002100)="b21bc6a92bb31ca96ddb37ca32ce5ee40a38c9896cb744ab7342468a3ad43396323c5f1fa4951fbd8e0a29dc0577bd5e12e9ee361bb87f35e23d40137fe309d8"}, {&(0x7f0000002140)="33acfc61bf4e5f1aa2ad7151aa1262875b932438cae5110c56f9c328373340807c1909cdd6f730cdb4bb198f8f"}, {&(0x7f0000003900)="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"}]}}, {{&(0x7f00000021c0)=@in={0x2, 0x4e24, @multicast1}, 0x0, &(0x7f0000002240), 0x0, &(0x7f0000002280)}}, {{0x0, 0x0, &(0x7f0000002480)=[{&(0x7f00000022c0)="fbdf1a5e09b6b8ed40e04d20ea105101964c71029b0654547a2358df060b4b3461a6a38efbf1af8f4cdfd9fe0fdd4bfcc401b419d77406ce44ea69f99c8ad5b336f39f4e8aaec5c01353215d3d1edda5de8877115801f7072b1aafd026822f1df19dcf2df99ce795ff85371a12f3adce33147bcede473361dd17dee6508f042bce18e54bb0db5df0ae90e791f7"}, {&(0x7f0000002380)="f9154f5abef9ad7c561cfd6f9472cb043b9a50fc511b2955e1d4beb693120b02aefce096a9f41eb9cd6ef0ad0625a06637c46397957b623ff96e065a4097edb577ce5b330e8e6fd356f9b25e0b0ab3799be7394ffadea54909b8f6f8b7a84b596764c111a98b4d4baaec100d62ac3c65d567a424d49631cca92c0cd26c400841375ff0694a6496f7488a5cd1c581d156972fe629bbee3c4e9c6d68820f84003d3e773ba990e0e7613f96cb356aebe3561cc1d561209345d74b597ec6dd114ff6ce38"}], 0x0, &(0x7f00000024c0)=[{0x0, 0x118, 0xad, "14c4984936e1f3dfafb93a20cb641dbb038d808deb842aee1ff69cf5d986f15052d5a98547ee9df683c50fc48026dc3dd2d2ae0457ecdb61376ca24698b823e91ce79a5222d2"}, {0x0, 0x101, 0x5, "0114a090cdc1880d4e9092e9586a7a67af70347f0223d57b9280ea4af439e4797253607c8f7ba6ccf0c254ca66fa740d16981bd4bd6d8a2a812e66967824573cb211cf988a08d6a7e57846af4d06f859dc7d87e78a33634856365379b1e03cc50b59cb1970c665191253810f31f5fc2bdf847d7d76f4d92db65a3db0c1e696fa027d236b4d93ad9f5a686c8212a4c97d2eae9cc6b2450c087c07b849fa3c9f9ad19314d209404b6221c8c7adfd9e4bd5e9961fd57534f91f599bcaa3fecb6451b717609e9d8b5b16378ec0456c00c5c45e9288713d7bd10ac71e067a41d64b"}, {0x0, 0x10d, 0x8, "7d62999a345cd0dd205d5dc918ff2e8394a9c1243e97ac612d3f9c4a2afe2e1480dbf71d777800af2e0e3d7763c00e4469a38597279e8ee37e4e7cb26301ec5a79d07a4e2007fc5ebd043cda7f2a37b381b9a56a29f48a5c705715813ac3a6"}, {0x0, 0x109, 0x3, "62ebc2dfe9ab659b0b59bb4fb5f43a72277b054301d239033c781917170129a2ef477bafbfd4206d9418fce66ccb8713920bed494ad2e0146647643a817e3352770211969c6695522015cd6b0b2d3e40582713fef0f8198a6a64856012063ff667aa04d6ea776ef43507b53ed5aac652e0846b6d7c847b2b614c7454629337e0d24edaec27c97eba9d4546a93f3cff082369599eba67d5fc88f15d97f30dc8668c416363618c06265b74e8900295"}, {0x0, 0x10e, 0x6, "41738e2884ab71f976767d3e09ade84fa0a65b3a32"}, {0x0, 0x6, 0x7, "e15f7c0c"}, {0x0, 0x1, 0x0, "84b2693d50a12b5ddacf0cc25c28b5e161a455c7525d8e131071f7c379e7969f745b9cdf1b60c45d61072d3f30ac4aed383bf78564c435b765656ff2299fdbbf9352244e30b2fe908a55891f7ec3227baf977438fb1371f382"}, {0x0, 0x101, 0x7, "abdf6bbb77338f03eb020ae83e82dedc026d1bc6c5e8abc627e25b7747472e6c031b45c2251d600a0fd8706af0fdcbf00367fcb26ab52f44d05678459b32deb8dc22320b4e65"}]}}, {{&(0x7f0000002840)=@ipx={0x4, 0x80, 0x11a7, "af65a7366e8e", 0x94}, 0x0, &(0x7f0000005a00)=[{&(0x7f0000004900)="8355cdd358123466ec2b06d253d710277d15d8b83f3ef2793bc2d1981301d954413ba8940ca621ff910e16a1f97492ac19fd0b5ba053577b7d5c12ab8fac9dd9b9021503d784fefb3bfb2c6a8c7428e364f64e16ec91f53b743db0930ea4e5c5b4f53693fc93d8c40c90156ab7946c5831a2de7d1c8b62c49ae3b3eba48ca0c8190c239f9c51bafaef4859c5f9fded592e31511aa22407fb50f3bab8698b3d1e9cbec31f0d5ccbae04e2f2eeade1f493a31eea35bdbcd0bbff5ad2422d255c49814a6be51d325dc44fc04f528b872f3e116b5f08ff4d697df2c9c24fbda0c2187b464500405db48982b7885d5eb67eee21d453ff091bf43d66ae43c4e1d49f5ec0c1d8f3cce3400371ba09863e6d6c2635778ad58897e8de2c3f0c8a3ec15394a3a876242d94a085b11c951f73ff28a3d3fbd9eddab6e55dff99317ffa982ff9821585fcb938466443e4e9540ef20e29dfdf5d89ec678793e238d9cf809498a2f17a37c1a51415a0ad6eb327114cae92ad0395ddef37c554513c4c0f2b59e54c5d13015b89a403522827e64a56f5e6257a82497340c7ae94c9fc0ab6eeaedf4ffe84f9a3783137176d47b6349fff2ab17a389ddf7fd2ba2db53122229bf8ce2ccf9ba44efaf27436206e4cfbe209e5ef9ca5989c971bc3e71ad8dfcd15ad03dfd586a35a1b7041ebe195b013c935148f19c1f2246bfcd4e81986a38b6846f401cdfdd7c01bd0e1dce82cd6251f581be68c2dc4f3398f095e637ccae1f7a85d69f1257af2d23b019e0e700f6302835c86735c85995638e305960c69b501fb8baad5bd3889d6eade53489b67072e5f3f6568115c082bb66a0b061f1e80d6bdb8917eadb2b59c20cd74bfe80a2da790bc16b8ca3277ff978d51637e06c728eaa0efce5598a2831036576367dd4583bd05ff49686ea2aee12080af3ad275f7f3ce9f27908520f83fc3ea90f666962a169243454c9be5356d6dac551ddbc5d885c5dfa6b1cc99725896c6bdca9cd9b6085000cfad18c0d95cb60e19d45af18882d1fefcbf4535ed5115b230749ed9cb0207321026a0467f236c91df9b4d1a9e0653b14ddde1008137aad9ca0c75516c5cda9820b733947dec8be037bb6e044b7ca29c31f812e1269653581fb3ce556927e76ed4512e7a3f3bb8f467d1c0cd04c59bd7cdb85cc5f60ac265bd1f6ac76b7feaac7f29bd42a5cb2844028c5f49dccebd0026400428eb6bb9dcc50fa65ced42e3ee0809823a4d85fefab3cc7348eefb2560bf2eee600ba01d3e6ef99e79c7518d73eba7437359696e35f095e7d7ddb2b78715cf6528dbf5456364988fe168051dae7f8419718880d2a52269c6e72bc3b884bd7c0d40f94a0e1a1b0845ed11861872e33c8ebcd038ade8020ad9c7329c54ad13d109a165dcafdf36001eb0e76ea84b81463386fd9ce6dfaf3a2a8c88aa5105b709ca1877b73bd9d996d0ed1ac9b7ceeaebbd61d23b655f0bed2f10493b88a933c4062d87f122ab4f84b6510d306c3e42ca95aafcea7d6e30ff81e3036d06bdf577ac4aeb81279a8918e489021954b598bfdcc8c1cbf3dbec61aad20e6081b8aa56e9d81286a81171d8b17fa2f8b54a2deb343db7f5ca1d588ff09e054bacd51383fb55764f230d6bc23075cb4a8198bc44c84598efa6b44bd8ae9f7552fb633123301a5e37bdb7d1589c15371d181f9871d890de45004b838318659e21979c5b313ab69155f4928e2d966d77e8d9714ef0f40dd8879c719822d06dd7b176e7c87bde12cc078f1050df4f5d85389c9d168273b782855d5e1a097615a4b60ed0dc07672bc5c08776d615d154a21aee965252eeff85e46490f7b55ba973dfa85e7fb6842fba68012229a7c6e518993c58574b85df893e003b7faa753fd4de2f68fd87ff83fc129dade2cfd84ce60b9f17e395be2b6d57120736d733829056caa2927abf5d006ba4bde761b2172ee8f8a16fdeeb67c49d67e0cce0dcfdfb4495e64340cc5bd40b4de9d127e559c5ecba812642fd3b902e438ade2c8f343b67214e501909be505a5564d3b59f191f60ff7b8cef65d6e5867bc04331a179e4f51d3f609d9ac4fc9821c65b29df06a8820fa0a5de6c873b9050a75e017585699d4898a03d5000aef6c50b6b379b97be6525618e0bef387c3b3d80a537b72d103dbfb16d7bab4fadc8e9c2f7a9eade1bc1648d54f579efab9866a9e09cfcfc185b9fac135f93e84a93fe7f983ca26c308b528b9a0d7255686751042d036ef9826c47502960edeabc391d373b9e5a5dad7c2ab0ae300dfd1fe2f24ce80c5c60f738115620aead35e3a831ec9d06c44e4b4724b48d4fdb919865cbafaa1671fb53b7912b65750b7259e649b7648331e92d6783d7b1d8ebc94652797ee8520be8c6cca9aff9d28ce8bcb8c9cca3c3b6924d901cba0d2de1cb89433641c57e88ae79a018aad176c8785c8e97ec98f5b1447199404b2a95db51b9c6b67a564bc8e45155572323a133e2d75e9ebb6a8e7741cfea3505dc6883e9ef55aa11e319d611eabac95685bf254d6f39f20fd9424def4a295c5823450c8994ae146c45100f88ffb25dbfbe8fab0b45a02af4d6760974e5f1cded9d086d6b6fe70597a168a97a1ea6721a07791f3f5df878a1e47d61f4311f0a5ed39d17706f1a973840b1b3fe13bc4c06b7155cd3bea659c862b961ff7ae6cf63a90fae331a473828a1f9b0382df4a6a46b127f96fa9a88f55671fc8a958f0fe877ea5595b05a22c861dac205c85dd0805fb05ce7dbe4ff5b4dc19ff1f366e38d44b7fdfa40cfbfffa4d64546e81832af34cd8be1362d011da27795b69672418888bcde8d16c36e63cc75f2ac880680848bf7f1af5c06b087a13ba58dd10bd67d6521ddc3111ae97de7f9c3b2a8f039851fe626d34344ba7ec68333f572e9355646eb950bd4ebfa35407abc32e56868bdf5bd0a0822b6756f962416b70a0f52039d2b17e79b954789f54cfc73112e896d2bee081b6135f270ce3d0068e043080125f6b19c7a9b781ed99caa7131f0d077d97eecc53958dc8fe12a90cec07749a1fb3005086b245039645fb6795b1a93e3c23cf8f8c719c6d1644465e0c37f8040b1de68e7fd4b9eb5f8c56a7ff6dde0394864d512cece915e66bc376f81f20d7fb16dae7bcacd30e868aa21972a04bd033bf2ede1a271bb5c056924918e0dcdc0fe105e244601ddac341373e96e279da7fe942f37735f7ad2e6fd5f20140bde315d77c03701d68499daac246c597abad04ff10a9a7cdae78d409e8c1142c5ab47b300b1b01779857ffc4f31ad968a9407cd0e63f1996bd8932bf1be2dcb25b39352d10fc3cfd831cbbb5e09670c623276a5d10dee453a51b1186c8dcb5d463366d5aed7f8710c46d58aa54fea23a99a8ec04b4421d66caa5161278bf59a8e49f4bde60881734dc5219ff0b390811e370831a73b4aa8961927b06ed49c6b280730eb30a767dfccb1683a0ebe8387369a87bad11dc6e076ed833259b99b9e013bb3d660d5452d6606d10f1aba4a2ccef8c5940d406c22249593a2c9a99c7ef9676613ea250728db9a5d56b5a1528634b138d37ea659becef7331d319d08797d1014925429e0929628dcada903277de48c3ee2b95e9c1b0131d25a7a9e17d23c08ff874deb4a693bd98b6386e4752a7574df143ee2e8dd189728f79205c71fd7131cc4ab9b79b507cfa4081d9e47344caa3f8b44806bca7f60d20760ecda73e2df979883941e082fb739abdb1f36bc97cc524cfc811b3d2b8a0d58bd9bc1d45900e0795656180cd0a2eacc1d59715e034b3fb1c7ee2a38e8bd5b46b6a8be9fd422d534488fd7dfef1f0f73ace1e5caf495331ff44c099dd23d7fa63a779fc79037bf7d6b6d98615894c61fddcbeb8c6f791432c3250e9e09f5e8fba0e97bc27670f4f69915ac91725ef9f2594304b611dd2aa20be3ec21efadffa2bb9665d2067463173c65a4a55d84eff888b094e559b759796766f8ae23f48f98e418841a8b633eab903429694cea997c7b11c81c904043f1752e8ebc2598dff488177282f73673f0736229eabac4cc3c6a7c73efbd7e11b0f3e30fd830dab6a2683eb253127d07b64b7b82424f183b7f2ccc45552db32f89a21d11f9f0bcf7d737ed61fb67de8053fdac9995c3ab875c8a6b314c6860cdeedd48ef84e563cedc8b4b249711979e10c08bbe0369b478ba501db420d14ac7a64137d41231a1387b00783f2cfd5b6ae1f6edbd16e3a7c725f5259b48611ef80ac18d43050caaf6eeabd26679d66336fa3a44995c632b95d9af306a99f97ea19c32e4be42aa9a0e68c6f5ae2cbe41c85b4a73c2b9d258e70d613f1e9b6c8d2e353503461b92e0b649b2234f95200d8db94eac945eb5f504a9532f45531251f84becfd574dffe08c6326188fc284f6542e177c576a5683ee9595da9ea6343009f197cc21f8e1eee2fdd973f5f1ffd21065dad375a5010c885fa590bc97df5060c015e79783732173b51d449f825d2c3a7c75ed874cd27b207dbbac17d67047f3be36e689b12ceba21a62518a08608525788a56fdf7538a6cec7ad37f71415122e2902c553e633cbcd9a62b9097ff69e24a3b604004c96a4d139a3634d6f950a76763122ae8a1f10085c0b7f9f44842984f61da9a14a8f67713471c3069c41515fee9647c8219bf724b816dcf3ebbcfb2ea2b0ac4ae62b90dbb49acbfa3c2f160bda7541095f652fe22850006aed32c0b9aa2cd649eb0590093159db0bf0e353f50df5d4a9d549ef0a493cef2bbc306479261998ecaabf9d3e5a72acea09faf996011049e46175525aa2bfaada41a984746573c727e7cd0e76aae6e584fa8594b78ccd282999a90a46d782aaa48fb1efcf0f53e51e46d0d9eeec6e6602fc3a11eafab03a9ade5b26fa8952d2f0e0de43766215fd04476f8270d96d54147877136185b992f2ed20a2cd42a2d2692ee48076d5e136ea4579ebbe8a6eb80be4a2ef385684c5a30c0c1418401fc329bb479a4a513fca7ed93284d8bf0f104615515317597515e7f7776d3035f6cb342006225d68aa767e5369279c269368ea1898375f422001cf54f9a350e3388d9bdfe2dd357aa646af43cbe77f347204868cdcc37cd27e6d37049a647ab657b1686234530799579b9adc9ea78a0d5fd68ec3965a37a7620db3964ba6199db56578de2670ae3d3d4bd709eff6387e94996193249cd7d499d57045f321a998efd04795c36129a246031388e9e3af89dbd7dbd99f46ae9ee4c8c50c5fa71c40656a8e42617cf352c026d0030d347058334d4643f16d6cf334258b13358f601808cc7411998d710ecd13f303a5b6ad265e7c406e34e091d55f696e2c6ca53d92c466edeeb85ab6872ef992cace03ffd3118d3a2e2a838da8b9daed4d83643b0dc7af964e77a8ebbcc9549b209e3624dd6deddf4942245b603dfe5cb21f36c1feefacd8e0b6cceb1556204e65f9caed045685fd20ea694366ad54d0be53d4337ab411591aa651b98a8c2fb7b67c1ba8ec896e4db9b384419de11fbd36c3c35fa0ea53c24bbec4fce843ace3df27276ab469af91a7e4325b137e469b4c29c22e987eff86a453ee4704bae3c085e60c52f373ebc13ae9b86f2f76ffe86d67f43cdc68f7841c4e186cc827c17384998e018efd5f74794bf77e039cb498556567e730030d8eefc875d2d0ba5c1d4821ac3a46fd9db6f9a6510a4e26f6ad9c1dfc8e3fd102fbf24df3ffe5ca7da04ef65b81abf8d75317f0935566c1c9c7edf1b89d52a6127e0861a0e593a5be224cd0044da851ec281d61d93"}, {&(0x7f0000005900)}, {&(0x7f0000005940)="36b88d7afc71cb3d9b90a3c971843d69dddb120b6eb818bcfff236fdaf93c5a7a121afcc7703144cb24ba73312c2e13433c83328afa36aa7dbdbb3ea064172f23ac419fa7bd9e53dc10fcfc145f73165e6fe9f309c47c5a731e172cea0301dd82880aa341f58f847519bd016a1d8a67239906a09cf57c5367d0c0c571e1f86aea50b2baa4dc5e059de151c6bb11dc8704f1f18ca2f7bb2a6675bfdec5db67bf3aa32bb6e4762daaf9ea24bb4f63be884b9dd67bd964a0b38ca04a6cb"}], 0x0, &(0x7f0000005a40)=[{0x0, 0x10c, 0x4, "00350514a7f877fbd765a07bcdc8b38ec82d4be9f7a0fe612abf7167729c484f3e6259d91dcd5226210d09fec666f75ce9429b920c157dc301c4664d5fdc19ad2d7fbb942cfe7727081d743e03541a46b9e69960544b07bdb60858794da39d6867642697dc3fa6e79e53c8a01ae6bc848dd745e1e69b1777e3a5ae22148ae53597a74933b84a5655889bf8d7706d07827712aea7101924d205ec99fe2a523276e237d4d3868fba86f8c51293f2669edb8806a563acbde3b6703cab1f61022b5215b4ce529a86486934d4c28f2961189df8f32d66848a04a6492dbd0753379ff636df38ba9ba8ed695678566861e11dd44fd92f1dabfd84a6a26557b50190491c3a5055086b0880cdcceb905e8600d32c9ff7a5039a7e78bac99ef419bc92a93a5a4baa62214138df79199568ae065bc02f772da25f7324d099213de2edc3ed548af5e85c678e2f4167719d42bcf9422a5110ef256dedde3f0a062ea4fe27335a44158d746443b0c0d87595ceaaccadd2bfd381c215bb5b2fbcc9b4ef80a101cadec8322706b49b5b5269c371a3eaa7781feca20d4f75800ee2029869a3ad099826418433e47af600e5105b5116e75124acdfe767982e30db35c53d16a73e19e983bb186744e1f1ace998eb4e8908de0606ffba0fc48dc10d832f4f9c746722286cba392598ea70034579ca04cdfb688168048068d873d16e138a98ae60a832b9a4657b08c41d371510ac35af7b380d5528926f748f1aae8cf87739563fe0dfe9480aa9c2cc0acd97d294ce70cc63f9043746a961dd14ec6a9ae861f7425ea4fd0be46e688ae32c023856b888ed268df2fb5659927d6e2be39309e5ef7a62a742605624961ee5e9b6a4ab81fb6cb2b6fc888ffe841463a5da8049dc086af31beb3518ad9f9068e27c3cc5c77b5677fdeb0d7a5a3f3c84779d20b9b6234ebc98d4f8da80cf0cc69c892c57419bbdbef3c37ebfa1d87eeb38ac093d8aa8f5b34fb989d377c3a73e15ce2ffd6557fd63c3a6c1c89cfe035c59d45298ba00d86e3e75ad4f33725a1ae249a87b07bf0a7cea9a3a1b614a3ebdbc75f0de78f457ff714bb83dd807f792fac933251d8a14ff84babf4ac928c6a7d3a751bccb96b1a68a230af7e409fbd883e260bb0662b7587dd8dc76712d4cd0b017c5909b21a86c5a2fe47001440acb7d42e3f051c2d96033f4d73b0219660f8acf678f0cb9183743c842505fc49bfe3bf8cf23686cf04d8f463a055abf15969fb35599c43e8d16ec114733f220c64c421ef415b28b0ec6b34b6362bb0c12b4397c9e7aa8b53e44cc88e1f5d7c2ce6cc5df0ebefb731d90e7e9e5e7ffeebdeb06a6905afc40c3f11838d80b34061c2fac11219f0c3475a2860f8d0b968c7f026ed297e4ede6f8fe2ea26ef4f0a2b39fb8ab3e160a5eea7fe75d61505c82e8db29c54c40e5aa6d131410dbbe4f46c534bea1864b308edca9231e2b9fa57036286e308f703bc4c92de90875d7b20d09b754bd403d0a549f8fad9122c407a996bce50612b0587bc9da80ea92169c0918bdd4f5919094681d11edc33464d8d9b8db3991cc7b9eb26b0b19d85a5243c6379d259b7b9c3e87f1258d6b5ab1c4efde4a8b346f087aa84cd037d851e3c827c9e22e7247230a91a2871b2457f094d034b2b7dd07550df5eab3c3bf30d2cb46f03fb671d2570295dccc36c8df3a885430fa4f58e9f3ae75d6c4d34740097d1ed3a7a1aa51115669f279eda0c8d790486ac1092c5afea77728918ebb273aaa26f5617eab985f5f435ef6ea3c1cc9332c262a3dd864f439581b8254df37e21f69498465551c8edca36860d693cf7d96ce32fde1c7df10f426422c62adf1a2634caf4bf79d2df5c839288dd4aad112d6b56a628ba655fb3de3c3dd055ae0553761c479068e82197062f7b375ba06f460dac7d432c4d40984eb688f5ca6010c6cd06bb2a56db6e905b3b1f0c6d922237b096e0b4577574732f02e7c4897633fbbbfc7622debf0766a3200caa9134ec21114f87afaf403e245b2fdfdb7ff9459359e9bb2f49acd5818e6551da79bfb32eb31567a0e1e01df101bcd1f9579183ffe24536cf21e7c525f9ec3650a0d4d9bc992b5735af7441650e47fdf8a35d3baf85695acdffe410d8ab53ddcddf21ee347bcdb2edd1d2540159e872b7fcb31f48b0298ec0a4b97606857e9026c39c637d1dd544f2af5b019ce9f948198af9f0383b2fdde0e0366ec456ac9c83bf0b8872ee34e1d1d8e811bdbc037572f439ec1b48955230ec9bd60592862aa3a67ab3dd81f3ded3e53ce68c4dd760cc35178563a250f8576b910049761958cad8746a67da2f8dae234def2aecfe19af93cb0d43184c1c2c886b5629cd180db0d6b5c6ae8527cad693f9c48f2330d80b53b2aeacc29d1cc708b84974b62c4ebc0eb646d32ed79d543c0156c0a84f26ff501ee3ff823cf7c168aba406702415b8bef2bdd2fdd6edea16227f6faac6ffa3d5cf115c39275e3e6a11b4fa7f26c9b04e225678a2c094c8ae7544f027469019b0dc4e92a37fc929fb07428d6f16bbef35e05ba49bcfde844f43f45d53e1bbc4aad434455a584f5fa7b070782c11882216187304ced73070a69010d646efb5784632a62ae2344cdc8b5eee15e3ab622934c0dd2eddbb492fc73bef6b874aab689714acba721a3a3435be1ab0b2c3e4d9f93ce0f246d23f04c55ca042bd98df8399f29a9f22cedef781029a62cd75cb644ca4e87899be74d691e81f34560af8536eec194ccaccb833beb580cabe9e7823abb308ac593fd049044940983b4f22091c1f8d03d9ea01e43faaa1b20bc75b84817256949672e15f36ed2ec30957f8af2ee2fe69df73f9bca91d89128fa76180e8c1e022abb0d70d7e9846002a5ef239a993b5a0526dffde658406d355891109c9740b01b80b20bb0a0908444a31100370b9e04de9c29ef07c0469fe499a326c997490cd70b18deed3f9257ec01a1a3b7f51b7f86e19a53064c768cc3a14ad949a246721f895222eaeef60480e66535edc54098d486c7bede93d3264ea17717f050a91ba8fb70ce98f474b04aa0aed7fd3e9752c2224b31f3b342106ff4a2c8e8f127578c41490b7efa2b0566642e8bf9e28b0310debff517267edb1ba80ae9ece12c99b30a9a09d60a541ce921f6aad3b3116aafd41874bea0492b6a1940a0a7d76875723678825321ed59ea01566ef4f9eb56ee0a29f79ba8d06ebeb1708df54f59173919a4a8db66dacac5357a2b543876eb2bfb877dfb5c81d0c3c690b00fff076e487ffc23befcc44bf227c786128bd638d3eafdc8966ae0f78785fe9cf063e9cde14d7bca512eb7414b5393e082baac0c9f4deeff80088e3a4a589ca686dd5ca6ac902e243b5a9c79002ca3e6e60e8b71a91b1cf1d35e17ccf5eba45894f37f8955d16e0cb21dd8a964695dc1c43394ffc02cf16b4aa0fbf6726323cf38846ee3403529569bf5c1a67e6a4b262c1354d67bd10e12c16ddb8a401d86c2d706b479dfc571bb68d51d374fc55f945b37acd3bb57addd64b8b56049286e953ea2c336d8d2c565ca88a57505f811793fd0815ba16026f1937dc8193046b79a38428075f2d55793151c9b16ce6d36a77cb7e325c3049ce094337385b4acb8b5e684c23c7e290018c28f650484b5e6227207d0440ce89d401e6817e40767e0109e37f41f9f01fff0366857118c070ff18b1f4986c421e9455c2abfdf3bc26ca16ca1bdd7c7acbdc6e8046890df3a7b373fc23862cd8c8d157c7bc7d1d1923d3f7d26bea6f25c26cc9263e35b7007ebdb6433f75e257ec176cdf9bdbc42088f27590d3f6b0ad90bdeaadcf8e7f81406dbc45304f5c5da892fa312818548c84495c972857360cef3f800b7715b70a5537487189f89ffa6844f4e3cfc6bd8c6dc4fe4045255ce2b2646d1d8690000f7ff6bd4d5f485582404b8180c991469a7c1f96b67280d9ceb6ca5ebbf822e7d5fd2b17dc4459154b1ca6eb994f7b7bed9572388a950972f5d0d73ebe8505da7aa578b69f8ef7211979dbfb80cbbcf1dc4558dfada7d437b856bf0610cc101e65dd6d40a8a8ee229c9f89a9907d716c2fd940540e436839f69c9c4ac37f48515b6edc0d9e38ce8d34f2ab8226ad52c5770eb8a37463080e1caaf4b1141c6b9f999184fca535f9191ef25bc36735a6be06ea3dc3e4d01d9aca04913a4843a0910d5e812e20619dfb8f8d88be63816433f95ba8db921fab085f3ffc48a3f8b82b1ebae2aa355e42f8f7cbfc6571784674614fee86707a1f55b6eb3376d26e561d43688a18379031382c09670e6cdcedc6324c737f043b934bb817aa0aedab3177fb5ceed0cc03ea4dfabfe2e12c649c34c0421aab8313d2456c56c3344d7cb477d1e6eb25b357c0cefdd3b722ba04899851640952e2c2fc745d6fd67485e81c0c82f3e955d7b361ea4a276ff6d2925f2489ef80f178aff80b7815c0eb7351da584f9a411bc240afa873c495ef71fbda931cd6bd4459c1f0b12d367ec48886e59e13d935d92078b3c697f0aceb32926ce21d9a9b787bf72ff9291e05c248e84e772f0602ffc88d4c5fa95e6a53d646476cc7d7755b39fdde18b76bfc1904fc9f67dbbccfa4ff184c73c13087c4051115d14ef2b2b5161fcd68bb648522a3a73f46e32f0631b5f65c7731de480302ae32869645de1aec3e50eec8d9e404ddeb4c6f06a008c8bf4397e0f45b11eb22f5ffbe0c34a986092349e72d2a4fee58422ba689f78a8c257bb3dcbdb14bb6f4142a40e5a6e52b7ad8a4b3715230d4b95a149918482156b23b187eb4a8f1674e172ea688928aafd8689d20a104761bef058a3511a4f75d35d1c543282f016a2afecdc7fdb1d2dba0dbb395895af3446487c64548959d4cd340f30a3b09220f904578c1e37cb8d380f4b07c2d4706bda752a0d2bf7aeb44115a19cc98b2c7963fca446e507f5a113320c732fc45992dd32e9792cb93d51384088b031b52fe22b667c2067694604417f726692ec5e19be060b0af62d3ef57fb1f28dc5b1727fc584a55363120f2fb11c381167bc3088046a34f3fe51773fe7c8a29e07c51985796421f45babf7b9ad85a5bf710e093b5d3eb111e68eeeeeed44c2c31a3199fb166aeb69ce6787dfaf634c17ac7f1281e255a217da96fbf1ccbbc00c0cce8609da1971046e58bb725824576d0966ea3df027f8f19f3776356a3b2a687e083f5a2808b3a5a772c407a71182731a9fb634ed6ef76afbed8e78623719aa169407dbd58fe1027a941e8801fcfc5407a117da7e7bc420bb5ccd29086f2eefa938d3dd95006773ab2306c53f4196591d2699e3af81a128408a18b2c51e2d93af792251b29adb1a47988d83ed584c9a8498a2776a9abf5e5efac7d90ccdbcdbe59cba1242e4d52de4a0e4c6b5f2b1851fa50d970d496c1743c3410bb885e232a74e626dec68e1007075a72bdfc4aa2e14c686aad4425a9fb028a546aa324de1d27a8b498d6f9bc60011ba3f50ea1a4e796384c435895e599cbfcaa23e152ac03490ff42acc57d0b7c3778aab4b1c9ad9aaa0fd3e88fe0626e6ee5466792a367b2ba849d6d5023d8b5eacfd6c89ed99c3b220725de4ac21c441f1b865f624f4d4e2e5a2675301205c469404526ed8351bf3aa1527076d97386fcaa8aabb383e89f96b78cbcf1652da9e407caaf91413800f09992ceeea4b98dfa98da235b95c8dc0e3c3c939c5e20045eb8d2c0805886295fad69992ffe2fa3a16d5bb8fd89f04a16b89c7bc227de95298700e857d47eb0550895886df10024935425db57"}]}}], 0x2, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6000, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:19 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r2) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x7c, 0x0, 0x5a, 0x0, 0x0, 0x7f, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x968}, 0x1100}, r2, 0x6, 0xffffffffffffffff, 0x0) open(0x0, 0x149400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r3 = getpid() rt_tgsigqueueinfo(0x0, r3, 0x0, 0x0) ptrace(0x10, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r4, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r3, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) r8 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000000)="10", 0x1, 0xfffffffffffffffd) keyctl$revoke(0x3, r8) keyctl$read(0xb, r8, 0x0, 0x0) keyctl$revoke(0x3, r8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6558, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0x0, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 646.193777] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 646.288511] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 646.321219] CPU: 0 PID: 1166 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 646.329085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.338456] Call Trace: [ 646.341068] dump_stack+0x197/0x210 [ 646.344723] warn_alloc.cold+0x7b/0x173 [ 646.348722] ? zone_watermark_ok_safe+0x260/0x260 [ 646.353587] ? compaction_deferred+0x16a/0x3b0 [ 646.358196] ? try_to_compact_pages+0x44/0xae0 [ 646.362830] __alloc_pages_slowpath+0x2214/0x2870 [ 646.367576] CIFS VFS: Device name not specified. [ 646.367711] ? warn_alloc+0x110/0x110 [ 646.372988] CIFS VFS: Malformed UNC in devname. [ 646.376262] ? __lock_is_held+0xb6/0x140 [ 646.376285] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 646.376303] ? should_fail+0x14d/0x85c [ 646.376325] ? __isolate_free_page+0x4c0/0x4c0 [ 646.376351] ? __might_sleep+0x95/0x190 [ 646.403063] __alloc_pages_nodemask+0x617/0x750 [ 646.407760] ? __alloc_pages_slowpath+0x2870/0x2870 [ 646.412800] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 646.418389] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 646.424129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 646.429688] alloc_pages_current+0x107/0x210 [ 646.434123] ion_page_pool_alloc+0x17f/0x270 [ 646.438563] ion_system_heap_allocate+0x154/0xa90 [ 646.443449] ? ion_system_heap_free+0x250/0x250 [ 646.448147] ? ion_alloc+0x306/0x900 [ 646.451882] ion_alloc+0x29b/0x900 [ 646.455444] ? ion_dma_buf_release+0x50/0x50 [ 646.459877] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 646.465438] ? _copy_from_user+0xdd/0x150 [ 646.469615] ion_ioctl+0x17b/0x329 [ 646.473175] ? ion_alloc.cold+0x28/0x28 [ 646.477168] ? __might_sleep+0x95/0x190 [ 646.481159] ? ion_alloc.cold+0x28/0x28 [ 646.485167] do_vfs_ioctl+0xd5f/0x1380 [ 646.489078] ? selinux_file_ioctl+0x46c/0x5d0 [ 646.493607] ? selinux_file_ioctl+0x125/0x5d0 [ 646.498117] ? ioctl_preallocate+0x210/0x210 [ 646.502541] ? selinux_file_mprotect+0x620/0x620 [ 646.507328] ? iterate_fd+0x360/0x360 [ 646.511153] ? nsecs_to_jiffies+0x30/0x30 [ 646.515327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 646.520886] ? security_file_ioctl+0x8d/0xc0 [ 646.525315] ksys_ioctl+0xab/0xd0 [ 646.528788] __x64_sys_ioctl+0x73/0xb0 [ 646.532702] do_syscall_64+0xfd/0x620 [ 646.536526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.541722] RIP: 0033:0x45b399 [ 646.544952] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 646.564566] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 646.572316] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 646.579596] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 20:09:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x8100, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0xfffffffb, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85241, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x2002, 0x800027b, 0x0, 0x1, 0x0, 0x0, 0xffff}, r2, 0x3, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r7, 0x0) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r9 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r9, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r9, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r9, 0x0, 0x8, &(0x7f0000000140)={r11, @remote, @loopback}, 0xc) ioctl$FICLONE(r7, 0x40049409, r8) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000480)={'team0\x00', r11}) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x404001}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x4e22, 0x81, @empty, 0x80000000}, 0x1c) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 646.586877] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 646.594162] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 646.601446] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 646.712911] warn_alloc_show_mem: 1 callbacks suppressed [ 646.712917] Mem-Info: [ 646.722501] active_anon:330581 inactive_anon:208 isolated_anon:0 [ 646.722501] active_file:2792 inactive_file:1915 isolated_file:0 [ 646.722501] unevictable:0 dirty:132 writeback:0 unstable:0 [ 646.722501] slab_reclaimable:15965 slab_unreclaimable:118218 [ 646.722501] mapped:55633 shmem:397 pagetables:4582 bounce:0 [ 646.722501] free:890370 free_pcp:328 free_cma:0 20:09:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xb606, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) r4 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000080)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={r6, @remote, @loopback}, 0xc) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x4e21, 0x2, @rand_addr="8472c5f2ae76e86ae9c3e2c20e0c13db", 0x7}, 0x1c) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 646.887242] Node 0 active_anon:1322124kB inactive_anon:832kB active_file:10260kB inactive_file:6488kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:221048kB dirty:520kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 647.025183] Node 0 DMA free:10448kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 647.082720] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 647.088453] Node 0 DMA32 free:57648kB min:36168kB low:45208kB high:54248kB active_anon:1322060kB inactive_anon:832kB active_file:10260kB inactive_file:6488kB unevictable:0kB writepending:520kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12064kB pagetables:18216kB bounce:0kB free_pcp:2468kB local_pcp:1384kB free_cma:0kB [ 647.123455] lowmem_reserve[]: 0 0 1 1 1 [ 647.128432] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 647.192368] lowmem_reserve[]: 0 0 0 0 0 [ 647.196423] Node 0 DMA: 2*4kB (UE) 5*8kB (UE) 2*16kB (U) 2*32kB (UE) 3*64kB (UE) 3*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10448kB [ 647.220300] Node 0 DMA32: 303*4kB (UME) 1186*8kB (UME) 1276*16kB (UME) 867*32kB (UME) 1*64kB (M) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 58924kB [ 647.240080] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 647.251093] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 647.262271] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 647.271162] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 647.280778] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:09:20 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xf000, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:20 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x24000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x12388, 0x0, 0x80, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8800000000000000, 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000d80100000000000098000000980000009800000098000000400100004001000040010000400100004001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b3139bc0afd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000020000000000000000000000000007ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000e1e046d3370c1cf100000000002800000000000000000000000000000000000000000000000000000000000000fbff"], 0x238) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x10) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000100)={0xfffffff, 0x2b, 0x7f, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x980903, 0x1, [], @p_u16=&(0x7f0000000040)=0x8}}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r4, 0xc01064c7, &(0x7f00000001c0)={0x2, 0x0, &(0x7f0000000180)=[0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r6, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r5, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r7, 0x40044104, &(0x7f00000000c0)=0x81) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 647.290167] 5137 total pagecache pages [ 647.294790] 0 pages in swap cache [ 647.298511] Swap cache stats: add 0, delete 0, find 0/0 [ 647.304864] Free swap = 0kB [ 647.308257] Total swap = 0kB [ 647.311523] 1965979 pages RAM [ 647.315240] 0 pages HighMem/MovableOnly [ 647.319519] 341741 pages reserved [ 647.323623] 0 pages cma reserved 20:09:20 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 647.455321] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 20:09:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xffff, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x80000001, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r4, 0x40206417, &(0x7f0000000040)={0x7fffffff, 0x40, 0xfff, 0x4, 0x0, 0x5}) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="73c0adc286d72ddad34cd546fd563c18ff06fc99eeb284b82d1b983e493d80c0c8a2a2864013b71ccce167f636832c2a9ba3b8fa157a8d4197573b5ab50e52cb635c3973d0086b1917fe278cc8c9956d3262ffe2dcb00ce7", 0x58}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 647.541185] CIFS VFS: Device name not specified. [ 647.547098] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 647.578212] CIFS VFS: Malformed UNC in devname. [ 647.584757] CPU: 0 PID: 1666 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 647.592583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.601949] Call Trace: [ 647.604566] dump_stack+0x197/0x210 [ 647.608227] warn_alloc.cold+0x7b/0x173 [ 647.612229] ? zone_watermark_ok_safe+0x260/0x260 [ 647.617092] ? compaction_deferred+0x16a/0x3b0 [ 647.621700] ? try_to_compact_pages+0x44/0xae0 [ 647.626322] __alloc_pages_slowpath+0x2214/0x2870 [ 647.631221] ? warn_alloc+0x110/0x110 [ 647.635049] ? __lock_is_held+0xb6/0x140 [ 647.639126] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 647.644680] ? should_fail+0x14d/0x85c [ 647.648589] ? __isolate_free_page+0x4c0/0x4c0 [ 647.653208] ? __might_sleep+0x95/0x190 [ 647.657207] __alloc_pages_nodemask+0x617/0x750 [ 647.661897] ? lockdep_hardirqs_on+0x415/0x5d0 [ 647.666498] ? __alloc_pages_slowpath+0x2870/0x2870 [ 647.671536] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 647.677094] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 647.683000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 647.688562] alloc_pages_current+0x107/0x210 [ 647.693007] ion_page_pool_alloc+0x17f/0x270 [ 647.697445] ion_system_heap_allocate+0x154/0xa90 [ 647.702316] ? ion_system_heap_free+0x250/0x250 [ 647.707011] ? ion_alloc+0x306/0x900 [ 647.710749] ion_alloc+0x29b/0x900 [ 647.714316] ? ion_dma_buf_release+0x50/0x50 [ 647.718760] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 647.724343] ? _copy_from_user+0xdd/0x150 [ 647.728532] ion_ioctl+0x17b/0x329 [ 647.732097] ? ion_alloc.cold+0x28/0x28 [ 647.736107] ? __might_sleep+0x95/0x190 [ 647.740105] ? ion_alloc.cold+0x28/0x28 [ 647.744115] do_vfs_ioctl+0xd5f/0x1380 [ 647.748029] ? selinux_file_ioctl+0x46c/0x5d0 [ 647.752547] ? selinux_file_ioctl+0x125/0x5d0 [ 647.757073] ? ioctl_preallocate+0x210/0x210 [ 647.761511] ? selinux_file_mprotect+0x620/0x620 [ 647.766293] ? iterate_fd+0x360/0x360 [ 647.770120] ? nsecs_to_jiffies+0x30/0x30 [ 647.774296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 647.779958] ? security_file_ioctl+0x8d/0xc0 [ 647.784390] ksys_ioctl+0xab/0xd0 [ 647.787867] __x64_sys_ioctl+0x73/0xb0 [ 647.791772] do_syscall_64+0xfd/0x620 [ 647.795597] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 647.800807] RIP: 0033:0x45b399 [ 647.804020] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 647.823134] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 647.830864] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 647.838157] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 647.845444] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 647.852730] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 647.860019] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:09:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:21 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) ptrace(0x10, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2604f9633e329764, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x9}, 0x8000000200017119, 0x800027b}, r1, 0x0, r7, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() tkill(0x0, 0x0) memfd_create(&(0x7f0000000000), 0x0) 20:09:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r7) r8 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r8) sendmsg$DEVLINK_CMD_RELOAD(r5, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, 0x0, 0x400, 0x70bd2a, 0x25dfdbff, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20000818}, 0x4800) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r9, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r10, 0x5}, 0x1c}}, 0x0) r11 = dup3(r3, r9, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r11, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 648.192508] Mem-Info: [ 648.196025] active_anon:330525 inactive_anon:206 isolated_anon:0 [ 648.196025] active_file:2815 inactive_file:1943 isolated_file:0 [ 648.196025] unevictable:0 dirty:132 writeback:0 unstable:0 [ 648.196025] slab_reclaimable:15968 slab_unreclaimable:117982 [ 648.196025] mapped:55676 shmem:397 pagetables:4621 bounce:0 [ 648.196025] free:888670 free_pcp:396 free_cma:0 [ 648.245472] Node 0 active_anon:1322100kB inactive_anon:824kB active_file:10352kB inactive_file:6600kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:221520kB dirty:520kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 648.308183] Node 0 DMA free:10448kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 648.345104] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 648.350343] Node 0 DMA32 free:59544kB min:36168kB low:45208kB high:54248kB active_anon:1322084kB inactive_anon:824kB active_file:10352kB inactive_file:6600kB unevictable:0kB writepending:520kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12192kB pagetables:18224kB bounce:0kB free_pcp:1812kB local_pcp:1192kB free_cma:0kB [ 648.386312] lowmem_reserve[]: 0 0 1 1 1 [ 648.390493] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 648.423464] lowmem_reserve[]: 0 0 0 0 0 [ 648.427987] Node 0 DMA: 2*4kB (UE) 5*8kB (UE) 2*16kB (U) 2*32kB (UE) 3*64kB (UE) 3*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10448kB [ 648.449458] Node 0 DMA32: 384*4kB (UE) 1157*8kB (UE) 1233*16kB (UE) 861*32kB (UE) 5*64kB (UM) 0*128kB 1*256kB (M) 1*512kB (M) 0*1024kB 0*2048kB 0*4096kB = 59160kB [ 648.469970] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 648.497779] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 648.510668] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 648.546500] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 648.580057] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 648.598032] 5158 total pagecache pages [ 648.603220] 0 pages in swap cache [ 648.607319] Swap cache stats: add 0, delete 0, find 0/0 [ 648.626397] Free swap = 0kB [ 648.629578] Total swap = 0kB [ 648.636206] 1965979 pages RAM [ 648.640373] 0 pages HighMem/MovableOnly [ 648.648026] 341741 pages reserved [ 648.651624] 0 pages cma reserved 20:09:21 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:21 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x2}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/184) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={r4, @remote, @loopback}, 0xc) setsockopt$inet6_buf(r2, 0x29, 0xd2, &(0x7f0000000180)="181b217492e1788fe92c782c5ce704e42596a8183b9482937de4825bb617ff1c096b3cb2de765246c461387e5fd58c8afeca9fdb7606f8adae25661a0035e4006e263648b674025e067bb3ce5e9a404008a98376cccce9bcdda14b746ffb39cd5fc4b2dde245bed45d9d7b1900ee338f21a524084bb2d597339d499b4b79762b81d72cba741894fa63de07453d4b6af4284161d2869246c5d65e", 0x9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xc88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) r5 = getpid() rt_tgsigqueueinfo(0x0, r5, 0x0, 0x0) ptrace(0x10, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x5}, 0x1c}}, 0x0) r9 = dup3(r6, r7, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r9, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r5, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:21 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, &(0x7f0000000200)) ptrace(0x10, r1) ptrace(0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r3, 0x5}, 0x1c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r2, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r1, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) [ 648.868645] device veth1_macvtap left promiscuous mode 20:09:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = accept4$unix(r4, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e, 0x80800) sendmsg(r5, &(0x7f00000002c0)={&(0x7f0000000180)=@x25={0x9, @remote={[], 0x0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000200)="a1212cf2a266310caae60387c0bdf602fd533489d71e8d8b72b1d46e67d8a0a2150865f9529dcb76fcec1c4d4833c310999c3f94887bf2adce172387386bc2f761", 0x41}, {&(0x7f0000000280)="199ebe41df836c6dbadad3", 0xb}, {&(0x7f0000000340)="7a6094a4f2e0ad214757aca77ceaa96d82a2d0b5e36e315a702dac261ee4dc5e16b0067dc46edef80935920587e903c4fdb912b6fc8faa7f945983a241839f9adb3a6f5c97b15888051fbfd189678478a7e55aaab098f2867c5ed1d4328d17", 0x5f}, {&(0x7f00000003c0)="42971c3480d0b334b35710f2e14cc294ed10cc21a0bf23a158b1b6dd8a21fc94f1ccbe8a668645bf26db631e9b842cc362df8c32fdc60c97e6080876fa4bb1e24b484970c1b34e82ded01984724c0da91fb4f7b7676c6e48bd6bf1cf7d861969b2fc6a50a04f800b84eb547a52657a1e0ffc21", 0x73}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="25d14e4dd1530fb5c00cadd68e1c4ac50813e9f6b322d746c5163cb0b5a43ee9b0f644256ce5bcf0aac95a7d0d3485a7bf563cc1d089dea9933ef497993d418f56423cfeffbfb7ab68d2a83ad278a507eaf936de1000ac1d81be4a7bb792e2470d84afb988b9fd8f65879d4173a5f08f82f2404c1ad433092277feb43aca39904d50e6a55e6758a5623ef2b700886ba77d556df44ebf8954453ffce31756449300488d526c0f4a09c014", 0xaa}], 0x6, &(0x7f0000001580)=[{0xa8, 0x6, 0x9, "f48264e288d500317b9083c72cc10c6c4ae9e536bae4f27f874111edd03113e3b9f78e5bf3773b3e6d70105d6ad2d9afd5f2d490a89699b43226a2a94327547cc5e77b5904ed34c33873980e27779582606a62dd7ddeff1e0c094885bbb395b4549cfbcb29e48e1843d93d8376603c39d9bfbd3578539dff875e8336bd3bf79ce4022b39c8dcd5b94fd873ed2f74e1bf8f1e83ac"}, {0x38, 0x102, 0x6, "1c52b2a4e7b63e808050255bde1710680629dcfe3cb36d925a5877a2bcab6c38a07063cd6fa7fa36"}, {0xa0, 0x105, 0x0, "651a63b2502f34f61f729d7799915b0cced6d66de2cb15d24e9f709036c0459296a3bb79b8618268f5a4db364e4e9036c9366bf20f83f124f279f42b83b249356b806bc1555a92cd95c6715d4d82ccc94abbe3c26716fc3ab6a201db105b0e1fd31d0497d1a872809a0ed5d8778a58a28b5377933f8c64f77aee109f788aa6c595b838abfc8e057a882380"}, {0x80, 0xc9, 0x3, "7ab5475abe1e0d862efdc8bfb7be5486808ded5811c2375266d33de8103cfc31811f934569e298bcc901a49b983b931c9438d112bf51be445bcb45593944d5cb333f4ceef33aed6912d043086de7e11851f4911a2d27ecb52ebb4a17635c07183f81361ea40efa4c8e71c44c61af9c"}, {0x70, 0x116, 0x8, "701cbd48d64fa0376d631355ed36314a44c9767a5495be084c1f9c51d3ac66b47480a6e4b9414657e55257e37e20fc2093231ae6ad16bbb5db712c88ad9ac2ef82a3b80c10f629cfe56264121ae7af28ed0681e29c284587d461"}, {0xa0, 0x101, 0x0, "f84bb83f1f9b47fa9ac180fcc0810b0cebadc1f4225f80cca93c85602f2f4b774829507149190cd803cb4462606a39b72b8b2049298a392f4ec6a320e330ee6261017bdafc52d5d36ac62486290bb1811e6374c7047ffda8476077bce80dade31df747b1488c6e0e8a7ba2d3740e1f96bcba35076c190bab29b340061157a18ba4a41d10eed9934666f0c98a"}], 0x310}, 0x20000040) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 649.014097] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 649.072382] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 649.090485] CPU: 1 PID: 2125 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 649.099707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.109536] Call Trace: [ 649.112176] dump_stack+0x197/0x210 [ 649.115829] warn_alloc.cold+0x7b/0x173 [ 649.119827] ? zone_watermark_ok_safe+0x260/0x260 [ 649.124811] ? compaction_deferred+0x16a/0x3b0 [ 649.129420] ? try_to_compact_pages+0x44/0xae0 [ 649.134046] __alloc_pages_slowpath+0x2214/0x2870 [ 649.138930] ? warn_alloc+0x110/0x110 [ 649.142757] ? __lock_is_held+0xb6/0x140 [ 649.146927] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 649.152614] ? should_fail+0x14d/0x85c [ 649.157811] ? __isolate_free_page+0x4c0/0x4c0 [ 649.162405] ? __might_sleep+0x95/0x190 [ 649.166386] __alloc_pages_nodemask+0x617/0x750 [ 649.171060] ? __alloc_pages_slowpath+0x2870/0x2870 [ 649.176076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 649.181613] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 649.187314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.192856] alloc_pages_current+0x107/0x210 [ 649.197273] ion_page_pool_alloc+0x17f/0x270 [ 649.201684] ion_system_heap_allocate+0x154/0xa90 [ 649.206525] ? ion_system_heap_free+0x250/0x250 [ 649.211208] ? ion_alloc+0x306/0x900 [ 649.214941] ion_alloc+0x29b/0x900 [ 649.218506] ? ion_dma_buf_release+0x50/0x50 [ 649.222928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 649.228587] ? _copy_from_user+0xdd/0x150 [ 649.232737] ion_ioctl+0x17b/0x329 [ 649.236277] ? ion_alloc.cold+0x28/0x28 [ 649.240266] ? __might_sleep+0x95/0x190 [ 649.244333] ? ion_alloc.cold+0x28/0x28 [ 649.248321] do_vfs_ioctl+0xd5f/0x1380 [ 649.252216] ? selinux_file_ioctl+0x46c/0x5d0 [ 649.256820] ? selinux_file_ioctl+0x125/0x5d0 [ 649.261422] ? ioctl_preallocate+0x210/0x210 [ 649.265920] ? selinux_file_mprotect+0x620/0x620 [ 649.270694] ? iterate_fd+0x360/0x360 [ 649.274510] ? nsecs_to_jiffies+0x30/0x30 [ 649.278663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.284199] ? security_file_ioctl+0x8d/0xc0 [ 649.288607] ksys_ioctl+0xab/0xd0 [ 649.292054] __x64_sys_ioctl+0x73/0xb0 [ 649.295938] do_syscall_64+0xfd/0x620 [ 649.299734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.304920] RIP: 0033:0x45b399 [ 649.308104] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.327017] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 649.334718] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 649.341973] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 649.349243] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 649.356510] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 649.363778] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:09:22 executing program 2: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 649.422458] Mem-Info: [ 649.424957] active_anon:330556 inactive_anon:206 isolated_anon:0 [ 649.424957] active_file:2743 inactive_file:2017 isolated_file:0 [ 649.424957] unevictable:0 dirty:133 writeback:1 unstable:0 [ 649.424957] slab_reclaimable:15965 slab_unreclaimable:117897 [ 649.424957] mapped:55717 shmem:397 pagetables:4639 bounce:0 [ 649.424957] free:841987 free_pcp:441 free_cma:0 [ 649.549745] Node 0 active_anon:1322224kB inactive_anon:824kB active_file:10064kB inactive_file:6896kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222064kB dirty:524kB writeback:4kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 20:09:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000180)=""/120, 0x78}, {&(0x7f0000000200)=""/231, 0xe7}], 0x3, &(0x7f0000001340)=""/74, 0x4a}, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) r4 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0xae, &(0x7f0000000040)="4584026b603abe4c0a9131ad9d90e3e4ebff5c51fe992d94260a26ec55265ec0074c23e4121e5109f9d1cf9fcf5a88e970246bdd672754785d0a4e5f65a9ca3de7398d90b0a2994de3bc7d5dce8285c7577d5fa9ef61ee88943e2cffa455e313013bbefea88f8640084869e8a09675136fc21f0df375825a26b7c1499bbd7363c3aca0d8597e7667a51e1c29f3ba26066f0c4400d27db7211617b2ce7e2f99d0e5a000685007f80f89f67678cca3"}) r8 = socket$inet_dccp(0x2, 0x6, 0x0) sched_setscheduler(0x0, 0x5, 0x0) listen(r7, 0x6) setsockopt(r8, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r8, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r8, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x4}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={r6, @remote, @loopback}, 0xc) r9 = accept4$x25(r4, &(0x7f0000001400), &(0x7f0000001440)=0x12, 0x100000) listen(r9, 0xf9) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) r10 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r11 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r10, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f0000000140)={r12, @remote, @loopback}, 0xc) r13 = socket(0x5, 0x1, 0x0) r14 = socket$inet_sctp(0x2, 0x1, 0x84) r15 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r15, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r14, 0x84, 0x23, &(0x7f0000000080)={r16}, 0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r13, 0x84, 0x0, &(0x7f0000002940)={r16, 0x2, 0x4, 0x1}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000001480)={r16, 0x8, 0x20}, &(0x7f00000014c0)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(r10, 0x84, 0x11, &(0x7f0000001500)={r17, 0x2}, &(0x7f0000001540)=0x8) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 649.586502] Node 0 DMA free:10448kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 649.677794] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 649.691292] Node 0 DMA32 free:60328kB min:36168kB low:45208kB high:54248kB active_anon:1322292kB inactive_anon:824kB active_file:10136kB inactive_file:6956kB unevictable:0kB writepending:620kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12352kB pagetables:18440kB bounce:0kB free_pcp:2420kB local_pcp:1124kB free_cma:0kB [ 649.772780] lowmem_reserve[]: 0 0 1 1 1 [ 649.787975] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 20:09:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x3, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x10000000, 0x0, 0x9}, 0x0, 0xffffffffffffffbf, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="400000000000b2b6cb441d2abd6c01000000000000800000007000000400020015000600bd6af73ab3c4cef2efe9000000ea193a637b43a1c14093010000010000000000f2c48d10792374165a94570000000000000015a7cb40973f292fd1506a2c1ee60d74c602e1069b854588754785e1c58fee18691ecc29"], 0x40}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) r8 = perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b, 0x2}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x5, 0x4e, 0x5d, 0x65, 0x0, 0x1, 0x19600, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0x802, 0xf2, 0x7, 0x8, 0x80000001, 0x27c83871, 0xfffd}, r2, 0x5, r8, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x3}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 649.978509] lowmem_reserve[]: 0 0 0 0 0 20:09:23 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 650.014082] Node 0 DMA: 1*4kB (U) 4*8kB (U) 3*16kB (UE) 2*32kB (UE) 3*64kB (UE) 3*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10452kB [ 650.084010] device veth1_macvtap entered promiscuous mode [ 650.102423] Node 0 DMA32: 702*4kB (UE) 1227*8kB (UME) 1260*16kB (UME) 871*32kB (UE) 1*64kB (M) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 60720kB [ 650.141392] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 650.172817] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 650.214636] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 650.290796] CIFS VFS: Device name not specified. [ 650.297040] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 650.309316] CIFS VFS: Malformed UNC in devname. [ 650.357848] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 650.409722] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 650.450623] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 650.497097] 5269 total pagecache pages [ 650.526690] 0 pages in swap cache [ 650.535624] Swap cache stats: add 0, delete 0, find 0/0 [ 650.560319] Free swap = 0kB [ 650.567465] Total swap = 0kB [ 650.585086] 1965979 pages RAM [ 650.597377] 0 pages HighMem/MovableOnly [ 650.615026] 341741 pages reserved [ 650.618601] 0 pages cma reserved 20:09:23 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:23 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet_tcp(0x2, 0x1, 0x0) r3 = getpid() rt_tgsigqueueinfo(0x0, r3, 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r2, 0xc0044dff, &(0x7f00000000c0)=0xffffffff) ptrace(0x10, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r4, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0x5, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0x9}, 0x8000000200036158, 0x800027b, 0x4}, r3, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x4}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xdb1) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r3, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 650.825274] device veth1_macvtap left promiscuous mode 20:09:23 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) r8 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:23 executing program 2: set_mempolicy(0x2, 0x0, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 651.058250] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 651.084179] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 651.089727] CPU: 1 PID: 2661 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 651.097533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.106897] Call Trace: [ 651.109502] dump_stack+0x197/0x210 [ 651.113152] warn_alloc.cold+0x7b/0x173 [ 651.117144] ? zone_watermark_ok_safe+0x260/0x260 [ 651.122270] ? compaction_deferred+0x16a/0x3b0 [ 651.126877] ? try_to_compact_pages+0x44/0xae0 [ 651.131493] __alloc_pages_slowpath+0x2214/0x2870 [ 651.136374] ? warn_alloc+0x110/0x110 [ 651.140188] ? __lock_is_held+0xb6/0x140 [ 651.144261] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 651.149811] ? should_fail+0x14d/0x85c [ 651.153715] ? __isolate_free_page+0x4c0/0x4c0 [ 651.158324] ? __might_sleep+0x95/0x190 [ 651.162320] __alloc_pages_nodemask+0x617/0x750 [ 651.167361] ? __alloc_pages_slowpath+0x2870/0x2870 [ 651.172401] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 651.178317] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 651.184048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.189780] alloc_pages_current+0x107/0x210 [ 651.194237] ion_page_pool_alloc+0x17f/0x270 [ 651.198665] ion_system_heap_allocate+0x154/0xa90 [ 651.204054] ? ion_system_heap_free+0x250/0x250 [ 651.208740] ? ion_alloc+0x306/0x900 [ 651.212568] ion_alloc+0x29b/0x900 [ 651.216154] ? ion_dma_buf_release+0x50/0x50 [ 651.220591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 651.226163] ? _copy_from_user+0xdd/0x150 [ 651.230342] ion_ioctl+0x17b/0x329 [ 651.233902] ? ion_alloc.cold+0x28/0x28 [ 651.237893] ? __might_sleep+0x95/0x190 [ 651.241884] ? ion_alloc.cold+0x28/0x28 [ 651.245868] do_vfs_ioctl+0xd5f/0x1380 [ 651.249769] ? selinux_file_ioctl+0x46c/0x5d0 [ 651.254284] ? selinux_file_ioctl+0x125/0x5d0 [ 651.258791] ? ioctl_preallocate+0x210/0x210 [ 651.263214] ? selinux_file_mprotect+0x620/0x620 [ 651.267988] ? iterate_fd+0x360/0x360 [ 651.271800] ? nsecs_to_jiffies+0x30/0x30 [ 651.276054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.281605] ? security_file_ioctl+0x8d/0xc0 [ 651.286052] ksys_ioctl+0xab/0xd0 [ 651.289537] __x64_sys_ioctl+0x73/0xb0 [ 651.293438] do_syscall_64+0xfd/0x620 [ 651.297252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.302455] RIP: 0033:0x45b399 [ 651.305920] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 651.324837] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 651.332569] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 651.339853] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 651.347134] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 651.354416] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 651.361704] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 651.466992] Mem-Info: [ 651.483754] active_anon:330510 inactive_anon:208 isolated_anon:0 [ 651.483754] active_file:2786 inactive_file:2113 isolated_file:0 [ 651.483754] unevictable:0 dirty:136 writeback:0 unstable:0 [ 651.483754] slab_reclaimable:15836 slab_unreclaimable:117357 [ 651.483754] mapped:55911 shmem:397 pagetables:4643 bounce:0 20:09:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) r4 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={r6, @remote, @loopback}, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x3, 0x1, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xf, 0x1, 'sane-20000\x00'}}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1508}, @CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x81b1}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1}]}, @CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x24000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x4}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x24000000}, 0x40000) [ 651.483754] free:779407 free_pcp:192 free_cma:0 20:09:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x6}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:24 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x4, 0x70bd21}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x7, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x101}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:24 executing program 2: set_mempolicy(0x2, 0x0, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:24 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() pipe(&(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x80000001, 0x0) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000100)={0x17, 0xaa, &(0x7f0000000180)="b5b697ce08a88111ea8585f66cf54832a312f1eefa249b3311b6216030172d10330b02e338cfecfcea80b92873ce0096a6945964564bee10fb2401f6a51560e1cb4d9ef73caf448a8d6b363924e7dc99423e36a03b54c9714fb5529a8e89c38e3cc1fb7854caf51290aff86f2b5a58bb228147e5e576b35582e90e7cadc1daedf584614ceea2c2806a31f33f7c4c7ee358c557da79cd4347c7efe77d3dfdae6024b9da4b4f1ad8ccf002"}) rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}, 0x1, 0x0, 0x0, 0x404c091}, 0x0) r8 = dup3(r5, r6, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port1\x00', 0x20, 0x0, 0x61fe, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b, 0x0, 0x0, 0x0, 0x0, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 651.653501] Node 0 active_anon:1322028kB inactive_anon:828kB active_file:10296kB inactive_file:7332kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222444kB dirty:560kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 20:09:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f00000002c0)={0x80001, 0x0, [0x0, 0xffffffffffffffbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) ioctl$KVM_GET_CPUID2(r4, 0xc008ae91, &(0x7f0000000040)={0x2, 0x0, [{}, {}]}) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r6, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r5, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 651.798317] Node 0 DMA free:11476kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 651.845754] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 651.851389] Node 0 DMA32 free:62984kB min:36168kB low:45208kB high:54248kB active_anon:1322324kB inactive_anon:816kB active_file:10308kB inactive_file:7360kB unevictable:0kB writepending:560kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12320kB pagetables:18496kB bounce:0kB free_pcp:1752kB local_pcp:472kB free_cma:0kB [ 651.920279] lowmem_reserve[]: 0 0 1 1 1 [ 651.927024] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 651.981715] lowmem_reserve[]: 0 0 0 0 0 [ 651.988711] CIFS VFS: Device name not specified. [ 651.989972] Node 0 DMA: 1*4kB (U) 4*8kB (U) 3*16kB (UE) 2*32kB (UE) 3*64kB (UE) 3*128kB (UE) 2*256kB (UE) 2*512kB (UE) 1*1024kB (E) 4*2048kB (UME) 0*4096kB = 11476kB [ 652.009105] CIFS VFS: Malformed UNC in devname. [ 652.099311] Node 0 DMA32: 702*4kB (UME) 1142*8kB (UE) 1378*16kB (UE) 871*32kB (UME) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 61928kB [ 652.170114] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 652.231874] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 652.278248] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 652.327814] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 652.353645] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 652.381782] 5330 total pagecache pages [ 652.386538] 0 pages in swap cache [ 652.390493] Swap cache stats: add 0, delete 0, find 0/0 [ 652.396430] Free swap = 0kB [ 652.400295] Total swap = 0kB [ 652.404179] 1965979 pages RAM [ 652.407783] 0 pages HighMem/MovableOnly [ 652.451951] 341741 pages reserved [ 652.474511] 0 pages cma reserved 20:09:25 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) r4 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={r6, @remote, @loopback}, 0xc) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x0, 0x0) recvfrom$unix(r7, &(0x7f0000000280)=""/60, 0x46, 0x40012122, 0x0, 0xfe4f) socket$l2tp6(0xa, 0x2, 0x73) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x4000, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r10 = socket$inet_udp(0x2, 0x2, 0x0) close(r10) splice(r9, 0x0, r10, 0x0, 0x80000001, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r9, 0x806c4120, &(0x7f0000000180)) accept4$bt_l2cap(r8, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f0000000100)=0xe, 0x80400) 20:09:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xa}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000000c0)={0x1c, r5, 0x800, 0x70bd28}, 0x1c}}, 0x4000010) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) r7 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r7, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000140)={r9, @remote, @loopback}, 0xc) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000440)={0x8, {{0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa93}}, {{0xa, 0x4e20, 0xdc1, @local, 0x76}}}, 0x108) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='hfs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:25 executing program 2: set_mempolicy(0x2, 0x0, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:26 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xc}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x1e, 0x5, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="6d616e676c6500000000000000800000000000000000000000000002000000000100000011a90fd01b53fb51d421a0fea7e0a1249312d48d1cbe95de022e73637af5de51c87ca7288f17a32007b97a62e8c189346e78ae9a8d572a3efaafc3c4a55b5e829b0a09adfe52e51d4c0a525ff5689b631014f4ab574585f95d4bdb1f83c1cdaf6154e58893c5191b8debf41ed2d077016009e3a5bfe353fb5c04e869b770d370438cc6202fa8d66c9b45"], &(0x7f0000000080)=0x25) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = socket(0xa, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r3, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) r5 = socket(0x1d, 0x800, 0x2) tee(r5, r2, 0x4, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000140)={r7, @remote, @loopback}, 0xc) r8 = socket(0x2, 0x1000000000000002, 0x0) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r9, &(0x7f00000005c0)=ANY=[@ANYBLOB="970a90d81825c3088c84ec03000000f24e3b340f2904a83ea0620300000086b353837708cd1a9458c65248efe59a3bf9f4668c5643b1552d80844bb304976f2177bb63a9cbbb7500a6fe75e022f9ae987f893a9caf62f1c50df155097d10f7d66e9f31f3e7cc9c7d924b1636f2b27836528237dfb3e01a2aa7b0c84be70d4874d5fb56f97d77689079b4c6304270627006f4b156727753879dc72eacb18528b8312a6f1febf9502bcc85f5e6edbfa9b1286519f40bf673f76b9e3e"], 0x35) setsockopt$inet6_udp_int(r8, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r9, 0x0, 0xffff, 0x9) sendto$inet(r8, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r8, r9, 0x0, 0x10001) ioctl$VIDIOC_QBUF(r9, 0xc058560f, &(0x7f0000000200)={0x9, 0xa, 0x4, 0x2000, 0x1, {}, {0x5, 0x0, 0x40, 0x81, 0x13, 0xf2, "e20e2fba"}, 0xc1, 0x4, @planes=&(0x7f00000001c0)={0x4, 0x0, @fd=r2, 0x1ba4}, 0x6, 0x0, r0}) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x16) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r14, @ANYBLOB="b3a42107a30e558685d38d47435a8125ca76f9a28d195b7f64994c2cc2e6e7a93ceaa33513ea635a7edd01bcec68a1d6dea7a6426c3c67dd6bf1c5cfc308f7e5b874650d85afca1dfb3001aa5d9015cc8205c0e12f1046495600f8e12a91f64d5a77ac0b500aae4b4f6bd3796ae8970569c6c534474f134209a49cc4e0a82318d6a247f2fc03784124535486125655a6ae0749b81fd4e751dd98cc2771fddba12a51a2d2d0d08e834f94b687a73a6f0837e9fd0f9a0913943a34846390975c54947cb310a0cdfa84613ffc8fad3c8d0ad4ef06e6937e4a6fb555167e933e5cc16a4a93e18f42592b217da85da2c3e6945226b5a6be92a493eb537899500484cdc7b78e45d1aefeb1b439258ac2001dd076ad483645a782941b1b3d0ec44acf6444f2c6e7b688b7f82728ce2159eaa4ec8abd1d62d784203b39d3365039e0064971f128f319cf33aaf314ca0227523586cc3bd24bf9c43bd042ca52cd16ad6389fda1056a679e34bbae990bfae27a93278261e1f055b60538df26976091c975da6cf47d05e02420cb9d0f5001da261ef8079f324cd7842353e29ff8893fb36bb17f8d", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r14, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca1bb372eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271c4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x74}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000dc0)=0xe8) sendmsg$inet(r10, &(0x7f0000000340)={&(0x7f0000000280)={0x2, 0x4e21, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000400)="ad5d6c373bdc9cbb1f502c82e37258978cac358aa62f74fa58a848663e566b082af04eb899087429d828c10397021bf9a702ffc48ba0b8704de30e5145cccc7076f62c55048dba719581d15829bbe38f0a1ecc7f9650ce9e4bbf2886d0f9d77167d2b907eeeab9aa29ac19b5aa6a638570bc5456fe5815f64fdb067f2babf40f364a61763fea2ae2992c8b63e7bcf8fbbebb113416868b123423c5f6cb45a16a385b4e85798da4bc35e078ce57812256bcc71e02ecb6920d82e306ed5f86f5bada4a91cc78127556af5316d34e92aa17deca9deaa11ae9aae63587fec5fe", 0xde}], 0x1, &(0x7f0000000e00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r15, @multicast1, @rand_addr=0x9}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc, 0x74, 0x3, 0x4, [{@broadcast, 0x6}]}, @end, @cipso={0x86, 0x6}, @ssrr={0x89, 0x2b, 0x99, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x25b, @broadcast, @broadcast, @multicast1, @local, @remote, @remote, @dev={0xac, 0x14, 0x14, 0xd}, @multicast2]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r14, @local, @remote}}}], 0x90}, 0x8040) recvfrom$rose(r5, &(0x7f0000000100)=""/53, 0x35, 0x40000042, &(0x7f0000000180)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x40) 20:09:26 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xe}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xf}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r5) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x3094405, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@rq={'rq', 0x3d, 0x2}}], [{@seclabel='seclabel'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@hash='hash'}, {@euid_gt={'euid>', r5}}]}}) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000000040)) [ 653.691564] device veth1_macvtap entered promiscuous mode [ 653.748541] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 653.787861] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 20:09:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x10}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket$inet6(0xa, 0x5, 0x0) socketpair(0x15, 0x800, 0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x7d, 0x0, @mcast2, 0xfffffffc}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xc28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getpid() r4 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r4) r5 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r5) rt_tgsigqueueinfo(0x0, r5, 0x0, &(0x7f0000000200)={0x11, 0x7e}) ptrace(0x10, r3) ptrace(0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x5}, 0x1c}}, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r3, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 653.942546] CIFS VFS: Device name not specified. 20:09:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x200, 0xfffffff2, 0xfffffffd, 0x4, 0x80000001, 0x6, 0xd50}, 0x1c) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:27 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 653.980162] CIFS VFS: Malformed UNC in devname. [ 653.991998] device veth1_macvtap left promiscuous mode 20:09:27 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x20000, 0x0) r7 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$TUNATTACHFILTER(r7, 0x401054d5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={0x0, 0xf, 0x0, 0x8}, &(0x7f00000008c0)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=0x10001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="850000005300000095000000000000445a0708d1303274df9696513dcf76656b8ba4549a791dba3e4233542f67a07e726fb3a73f3629526d2cdfe007a255df2fa25dc49432457ddde8ec5afff74287d7b8e902ab041da7cbfb0fefd473038d958723088900cdc2ffcc604a94dbf6fd2cd61b0dfc2cbe6880df8b5d0e00e07ea49e083963cedf928cc8cbae6903bb9adc8847cb065d8fa0a5014641"], 0x0, 0x0, 0x2e, &(0x7f0000000500)=""/46, 0x41100, 0x9, [], 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x10, 0x3}, 0x10, r8, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r8}, 0x78) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r8, 0x4) ioctl$FS_IOC_GETFSMAP(r9, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x5, 0x0, [], [{0x9, 0x1, 0x4, 0x3, 0x9a3}, {0x7, 0x9, 0x6f09, 0x3ff, 0x3, 0x4}], [[], [], [], [], []]}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:27 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 654.919625] CIFS VFS: Device name not specified. [ 654.948786] CIFS VFS: Malformed UNC in devname. 20:09:28 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r4 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={r6, @dev={0xac, 0x14, 0x14, 0x2d}, @local}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000100)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0xc) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r8, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r9, 0x5}, 0x1c}}, 0x0) r10 = dup3(r3, r8, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r10, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x60}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:28 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x1e, 0x4, 0x0) ioctl$SIOCX25SENDCALLACCPT(0xffffffffffffffff, 0x89e9) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) setsockopt(r0, 0x9a3a, 0x8, &(0x7f0000000340)="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", 0x1000) sendmmsg(r4, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r3, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xf0}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x1c, r6, 0x8, 0x70bd28}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x300}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 655.458074] device macsec0 entered promiscuous mode 20:09:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x600}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 655.496326] CIFS VFS: Device name not specified. 20:09:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x1d, 0x2, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r5, 0x0) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r7 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r7, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000140)={r9, @remote, @loopback}, 0xc) ioctl$FICLONE(r5, 0x40049409, r6) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000480)={'team0\x00', r9}) sendmsg$TEAM_CMD_PORT_LIST_GET(r6, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x404001}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e22, 0x7, @empty, 0xae}}, 0x1, 0x3f, 0x2d, 0x85d, 0x2, 0xffc6, 0x3f}, &(0x7f0000000040)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000080)={r10, 0x7}, &(0x7f0000000280)=0x8) r11 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r11, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) r12 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r12, 0x0) r13 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r13, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r14 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r14, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r15 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r15, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r14, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r14, 0x0, 0x8, &(0x7f0000000140)={r16, @remote, @loopback}, 0xc) ioctl$FICLONE(r12, 0x40049409, r13) ioctl$ifreq_SIOCGIFINDEX_team(r13, 0x8933, &(0x7f0000000480)={'team0\x00', r16}) sendmsg$TEAM_CMD_PORT_LIST_GET(r13, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x404001}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000) setsockopt$inet_opts(r13, 0x0, 0x8, &(0x7f0000000180)="ca5ee6faa8955fb1cc808b58eaf79270a36ebef185035ccec25e925d0edb28b9a9eb5373353ffd960c130ce95b325739dbbe16527f553e95b79b4efdb6fd48aa391d85c2367751985015b50213ec46a3581f81a7daa5306e7ab3025aa00edf7490f9fb2279fdb6e11e6c9a5fbfb8403fb1107fb196a9b181abfecb7a5d07026175e0ee00953cb1b9e06f67e2841a719dfcf9ab93c887375ad4abdfa9cd0ee49ba127ac0c0ae3457b9b58f055b5fa7b40312fafaaddadb20fba76ee56eae255de34043042cc3270f0", 0xc8) r17 = socket$nl_generic(0x10, 0x3, 0x10) r18 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r17, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r18, 0x5}, 0x1c}}, 0x0) sendmmsg(r17, &(0x7f0000000380), 0x0, 0x4044000) recvfrom$unix(r3, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 655.558177] CIFS VFS: Malformed UNC in devname. [ 655.659247] device macsec0 left promiscuous mode 20:09:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x1c, r5, 0x5, 0x0, 0x25dfdbff}, 0x1c}}, 0x2400c845) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5, 0x70bd28}, 0x1c}}, 0x0) r8 = dup3(r3, r6, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 655.696493] can: request_module (can-proto-0) failed. [ 655.713202] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 655.772596] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 655.804626] CPU: 0 PID: 3713 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 655.812472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.821845] Call Trace: [ 655.824461] dump_stack+0x197/0x210 [ 655.828138] warn_alloc.cold+0x7b/0x173 [ 655.832144] ? zone_watermark_ok_safe+0x260/0x260 [ 655.837190] ? compaction_deferred+0x16a/0x3b0 [ 655.841794] ? try_to_compact_pages+0x44/0xae0 [ 655.846507] __alloc_pages_slowpath+0x2214/0x2870 [ 655.851400] ? warn_alloc+0x110/0x110 [ 655.855233] ? __lock_is_held+0xb6/0x140 [ 655.859553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 655.865140] ? should_fail+0x14d/0x85c [ 655.869082] ? __isolate_free_page+0x4c0/0x4c0 [ 655.873900] ? __might_sleep+0x95/0x190 [ 655.877901] __alloc_pages_nodemask+0x617/0x750 [ 655.882623] ? __alloc_pages_slowpath+0x2870/0x2870 [ 655.887686] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 655.893447] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 655.899195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.904782] alloc_pages_current+0x107/0x210 [ 655.909236] ion_page_pool_alloc+0x17f/0x270 [ 655.914755] ion_system_heap_allocate+0x154/0xa90 [ 655.919662] ? ion_system_heap_free+0x250/0x250 [ 655.924397] ? ion_alloc+0x306/0x900 [ 655.928157] ion_alloc+0x29b/0x900 [ 655.931733] ? ion_dma_buf_release+0x50/0x50 [ 655.936172] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 655.941736] ? _copy_from_user+0xdd/0x150 [ 655.945897] ion_ioctl+0x17b/0x329 [ 655.949462] ? ion_alloc.cold+0x28/0x28 [ 655.953445] ? __might_sleep+0x95/0x190 [ 655.957428] ? ion_alloc.cold+0x28/0x28 [ 655.961537] do_vfs_ioctl+0xd5f/0x1380 [ 655.965431] ? selinux_file_ioctl+0x46c/0x5d0 [ 655.969927] ? selinux_file_ioctl+0x125/0x5d0 [ 655.974435] ? ioctl_preallocate+0x210/0x210 [ 655.978852] ? selinux_file_mprotect+0x620/0x620 [ 655.983628] ? iterate_fd+0x360/0x360 [ 655.987442] ? nsecs_to_jiffies+0x30/0x30 [ 655.991607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.997144] ? security_file_ioctl+0x8d/0xc0 [ 656.001673] ksys_ioctl+0xab/0xd0 [ 656.005142] __x64_sys_ioctl+0x73/0xb0 [ 656.009044] do_syscall_64+0xfd/0x620 [ 656.012859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.018056] RIP: 0033:0x45b399 [ 656.021269] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 656.040180] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 656.047899] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 656.055181] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 656.062461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 656.069829] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 656.077115] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 656.277315] Mem-Info: [ 656.279889] active_anon:331038 inactive_anon:208 isolated_anon:0 [ 656.279889] active_file:2830 inactive_file:2217 isolated_file:0 [ 656.279889] unevictable:0 dirty:156 writeback:0 unstable:0 [ 656.279889] slab_reclaimable:15655 slab_unreclaimable:117501 [ 656.279889] mapped:56018 shmem:397 pagetables:4651 bounce:0 [ 656.279889] free:842764 free_pcp:544 free_cma:0 [ 656.290854] CIFS VFS: Device name not specified. [ 656.319177] CIFS VFS: Malformed UNC in devname. [ 656.319862] Node 0 active_anon:1324152kB inactive_anon:832kB active_file:10412kB inactive_file:7696kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222856kB dirty:616kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 589824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 656.360220] Node 0 DMA free:10452kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 656.393906] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 656.400319] Node 0 DMA32 free:63732kB min:36168kB low:45208kB high:54248kB active_anon:1324252kB inactive_anon:832kB active_file:10412kB inactive_file:7696kB unevictable:0kB writepending:616kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12288kB pagetables:18604kB bounce:0kB free_pcp:1996kB local_pcp:884kB free_cma:0kB [ 656.470114] can: request_module (can-proto-0) failed. [ 656.496441] lowmem_reserve[]: 0 0 1 1 1 [ 656.501123] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 656.534310] lowmem_reserve[]: 0 0 0 0 0 [ 656.539443] Node 0 DMA: 1*4kB (U) 4*8kB (U) 3*16kB (UE) 2*32kB (UE) 1*64kB (E) 2*128kB (UE) 1*256kB (E) 1*512kB (E) 3*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10452kB [ 656.561034] Node 0 DMA32: 1021*4kB (UME) 742*8kB (UME) 1583*16kB (UME) 895*32kB (UE) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 64052kB [ 656.583668] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 656.603357] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 656.624513] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 656.674693] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 656.690391] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 656.699614] 5446 total pagecache pages [ 656.709716] 0 pages in swap cache [ 656.715172] Swap cache stats: add 0, delete 0, find 0/0 [ 656.721000] Free swap = 0kB 20:09:29 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x6b6}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) r2 = accept4$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x40800) r3 = socket(0x5, 0x1, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x23, &(0x7f0000000080)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002940)={r6, 0x2, 0x4, 0x1}, 0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={r6, 0x5, 0x9, 0x7, 0x9, 0x2}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r7 = getpid() rt_tgsigqueueinfo(0x0, r7, 0x0, 0x0) ptrace(0x10, r7) r8 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r8, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r9, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r10, 0x5}, 0x1c}}, 0x0) r11 = dup3(r8, r9, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r11, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:29 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) fcntl$addseals(r3, 0x409, 0x2) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r5, &(0x7f00000028c0), 0x0, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 656.724877] Total swap = 0kB [ 656.728554] 1965979 pages RAM [ 656.731977] 0 pages HighMem/MovableOnly [ 656.736841] 341741 pages reserved [ 656.740568] 0 pages cma reserved 20:09:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xa00}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 656.968907] CIFS VFS: Device name not specified. [ 656.984217] CIFS VFS: Malformed UNC in devname. [ 657.018426] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 20:09:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = dup3(r3, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x82, 0x0) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r6, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="44030000", @ANYRES16=r7, @ANYBLOB="04002dbd7000ffdbdf250300000006001c00090000000500220000000000060003000200000006001c0006000000000004000000000000000000000000007628fd71ed0731014cd0fc84aa634484ea418358b6d97cdfe7b633d97b819158f96fdf830933bca7934fb2d41185e798440aaf6ace1623197fa2ab"], 0x44}, 0x1, 0x0, 0x0, 0x20000c0}, 0x4040000) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xc00}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 657.060442] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 657.088955] CPU: 1 PID: 4145 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 657.096802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.106172] Call Trace: [ 657.108787] dump_stack+0x197/0x210 [ 657.112492] warn_alloc.cold+0x7b/0x173 [ 657.116497] ? zone_watermark_ok_safe+0x260/0x260 [ 657.121371] ? compaction_deferred+0x16a/0x3b0 [ 657.125983] ? try_to_compact_pages+0x44/0xae0 [ 657.130606] __alloc_pages_slowpath+0x2214/0x2870 [ 657.135623] ? warn_alloc+0x110/0x110 [ 657.139450] ? __lock_is_held+0xb6/0x140 [ 657.143545] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 657.149253] ? should_fail+0x14d/0x85c [ 657.153171] ? __isolate_free_page+0x4c0/0x4c0 [ 657.157795] ? __might_sleep+0x95/0x190 [ 657.161810] __alloc_pages_nodemask+0x617/0x750 [ 657.166513] ? __alloc_pages_slowpath+0x2870/0x2870 [ 657.171568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 657.177133] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 657.182871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.188438] alloc_pages_current+0x107/0x210 [ 657.192885] ion_page_pool_alloc+0x17f/0x270 [ 657.197427] ion_system_heap_allocate+0x154/0xa90 [ 657.202304] ? ion_system_heap_free+0x250/0x250 [ 657.207007] ? ion_alloc+0x306/0x900 [ 657.210764] ion_alloc+0x29b/0x900 [ 657.214363] ? ion_dma_buf_release+0x50/0x50 [ 657.218825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 657.224470] ? _copy_from_user+0xdd/0x150 [ 657.228695] ion_ioctl+0x17b/0x329 [ 657.232292] ? ion_alloc.cold+0x28/0x28 [ 657.236415] ? __might_sleep+0x95/0x190 [ 657.240428] ? ion_alloc.cold+0x28/0x28 [ 657.244407] do_vfs_ioctl+0xd5f/0x1380 [ 657.248401] ? selinux_file_ioctl+0x46c/0x5d0 [ 657.252897] ? selinux_file_ioctl+0x125/0x5d0 [ 657.257413] ? ioctl_preallocate+0x210/0x210 [ 657.261828] ? selinux_file_mprotect+0x620/0x620 [ 657.266949] ? iterate_fd+0x360/0x360 [ 657.270762] ? nsecs_to_jiffies+0x30/0x30 [ 657.274927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.280482] ? security_file_ioctl+0x8d/0xc0 [ 657.284909] ksys_ioctl+0xab/0xd0 [ 657.288377] __x64_sys_ioctl+0x73/0xb0 [ 657.292278] do_syscall_64+0xfd/0x620 [ 657.296099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.301417] RIP: 0033:0x45b399 [ 657.304609] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 657.323518] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 657.331248] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 657.338534] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 657.345817] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 657.353110] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 20:09:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0x1000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 657.360390] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:09:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xe00}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 657.438336] Mem-Info: [ 657.441770] active_anon:330550 inactive_anon:208 isolated_anon:0 [ 657.441770] active_file:2830 inactive_file:2223 isolated_file:0 [ 657.441770] unevictable:0 dirty:156 writeback:0 unstable:0 [ 657.441770] slab_reclaimable:15647 slab_unreclaimable:117529 [ 657.441770] mapped:56022 shmem:397 pagetables:4581 bounce:0 [ 657.441770] free:860022 free_pcp:501 free_cma:0 20:09:30 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xf00}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 657.614925] Node 0 active_anon:1322396kB inactive_anon:832kB active_file:10452kB inactive_file:7792kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222832kB dirty:616kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 589824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 657.672658] CIFS VFS: Device name not specified. [ 657.702410] Node 0 DMA free:10524kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 657.716289] CIFS VFS: Malformed UNC in devname. 20:09:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000040)={0x8, 0x68, 0x1cf7, 0x3, 0xfffeffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x8, 0x9}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fa, 0x0, 0x2, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:30 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 657.759135] device macsec0 entered promiscuous mode [ 657.824606] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 657.856707] Node 0 DMA32 free:62208kB min:36168kB low:45208kB high:54248kB active_anon:1322212kB inactive_anon:832kB active_file:10452kB inactive_file:7744kB unevictable:0kB writepending:620kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12288kB pagetables:18388kB bounce:0kB free_pcp:2072kB local_pcp:1060kB free_cma:0kB [ 657.965941] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 657.977777] lowmem_reserve[]: 0 0 1 1 1 [ 657.983204] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 658.005852] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 658.050929] CPU: 1 PID: 4514 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 658.058777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.068146] Call Trace: [ 658.070768] dump_stack+0x197/0x210 [ 658.072563] lowmem_reserve[]: 0 0 0 0 0 [ 658.074412] warn_alloc.cold+0x7b/0x173 [ 658.078393] Node 0 DMA: 1*4kB (U) 5*8kB (U) 3*16kB (UE) 2*32kB (UE) 1*64kB (E) 2*128kB (UE) 1*256kB (E) 1*512kB (E) 3*1024kB (UE) 3*2048kB (UME) 0*4096kB = 10460kB [ 658.082403] ? zone_watermark_ok_safe+0x260/0x260 [ 658.082420] ? compaction_deferred+0x16a/0x3b0 [ 658.082437] ? try_to_compact_pages+0x44/0xae0 [ 658.082477] __alloc_pages_slowpath+0x2214/0x2870 [ 658.116245] ? warn_alloc+0x110/0x110 [ 658.120070] ? __lock_is_held+0xb6/0x140 [ 658.124182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 658.129751] ? should_fail+0x14d/0x85c [ 658.133744] ? __isolate_free_page+0x4c0/0x4c0 [ 658.138352] ? __might_sleep+0x95/0x190 [ 658.142352] __alloc_pages_nodemask+0x617/0x750 [ 658.147163] ? __alloc_pages_slowpath+0x2870/0x2870 [ 658.152226] ? fs_reclaim_acquire+0x20/0x20 [ 658.156607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 658.162175] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 658.167901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.173466] alloc_pages_current+0x107/0x210 [ 658.177912] ion_page_pool_alloc+0x17f/0x270 [ 658.182347] ion_system_heap_allocate+0x154/0xa90 [ 658.187226] ? ion_system_heap_free+0x250/0x250 [ 658.191922] ? ion_alloc+0x306/0x900 [ 658.195662] ion_alloc+0x29b/0x900 [ 658.199229] ? ion_dma_buf_release+0x50/0x50 [ 658.203670] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 658.209245] ? _copy_from_user+0xdd/0x150 [ 658.213444] ion_ioctl+0x17b/0x329 [ 658.217012] ? ion_alloc.cold+0x28/0x28 [ 658.217133] Node 0 DMA32: 1220*4kB (UME) 208*8kB (UME) 1545*16kB (UME) 921*32kB (UME) 0*64kB 0*128kB 5*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 0*4096kB = 65088kB [ 658.221018] ? __might_sleep+0x95/0x190 [ 658.238624] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 658.240011] ? ion_alloc.cold+0x28/0x28 [ 658.240032] do_vfs_ioctl+0xd5f/0x1380 [ 658.240049] ? selinux_file_ioctl+0x46c/0x5d0 [ 658.240067] ? selinux_file_ioctl+0x125/0x5d0 [ 658.251568] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 658.254830] ? ioctl_preallocate+0x210/0x210 [ 658.254849] ? selinux_file_mprotect+0x620/0x620 [ 658.254871] ? iterate_fd+0x360/0x360 [ 658.254889] ? nsecs_to_jiffies+0x30/0x30 [ 658.254911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.254928] ? security_file_ioctl+0x8d/0xc0 [ 658.254946] ksys_ioctl+0xab/0xd0 [ 658.254962] __x64_sys_ioctl+0x73/0xb0 [ 658.254982] do_syscall_64+0xfd/0x620 [ 658.259194] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 658.263367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.263381] RIP: 0033:0x45b399 [ 658.263396] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 658.263404] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 658.263416] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 658.263424] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000003 [ 658.263431] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 658.263440] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 658.263448] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 658.400906] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 658.426955] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 658.436076] 5462 total pagecache pages [ 658.440380] 0 pages in swap cache [ 658.444711] Swap cache stats: add 0, delete 0, find 0/0 [ 658.450324] Free swap = 0kB [ 658.454014] Total swap = 0kB [ 658.457370] 1965979 pages RAM [ 658.460822] 0 pages HighMem/MovableOnly [ 658.465983] 341741 pages reserved [ 658.469840] 0 pages cma reserved 20:09:31 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x3f00}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) ptrace(0x10, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)={0x1c, r4, 0x801, 0x0, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r5 = dup3(r2, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r1, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) r6 = socket(0x2, 0x1000000000000002, 0x0) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r7, &(0x7f0000000280)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf9f4668c3543"], 0x35) setsockopt$inet6_udp_int(r6, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r7, 0x0, 0xffff, 0x9) sendto$inet(r6, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r6, r7, 0x0, 0x10001) write$P9_RWALK(r7, &(0x7f0000000180)=ANY=[@ANYBLOB="640000006f0100070010010000000800000000000000fa02000000010000000000000008020000000000000000000000400400000002000000d94804b6e30000000000030000000200000000000000100200000003000000000000008002000000040000"], 0x64) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x20204903, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x4000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 658.789788] device macsec0 left promiscuous mode 20:09:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r5 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000140)={r7, @remote, @loopback}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000180)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) connect$packet(r4, &(0x7f0000000100)={0x11, 0x16, r8, 0x1, 0x1f, 0x6, @random=';GWp$2'}, 0x14) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x5865}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:32 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 659.115591] CIFS VFS: Device name not specified. [ 659.146054] device veth1_macvtap entered promiscuous mode [ 659.156490] CIFS VFS: Malformed UNC in devname. [ 659.179836] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready 20:09:32 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 659.234019] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 20:09:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r2, 0x8004500b, &(0x7f0000000040)=0xf4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r3, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x6000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r5) r6 = getpgid(r5) sched_setaffinity(r6, 0x8, &(0x7f00000000c0)=0x7fffffff) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) r8 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b, 0x0, 0x0, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0xa94323ef42da9e06, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x4, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:32 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 659.452549] device veth1_macvtap left promiscuous mode 20:09:32 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:32 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:32 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:32 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:32 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:33 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 20:09:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x6558}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000200)=""/76, 0x4c, 0x40000123, 0x0, 0x0) 20:09:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x100}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 660.250361] device macsec0 entered promiscuous mode 20:09:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)="9d27d4082d267ca79b33da84a64b44242dfbdd1ac1c7ab2fa77bf0b310721d52ff1cc079dcb7f727df20c5d920b1c132d04fd044b37de629063ee733277fde095383d000fcbd", 0x46}, {&(0x7f0000000180)="ee42324dda3766d9c3af9065f5a9f0b378594fb0a1fa005bdf62e1627de58e79a5e91c82ec8552dee8dae9ef3c43097b39924e005f01a1d4ab04c2cfef212a4ef4e3645a042df4e380e3ec3037d5aded592f75b6e2ac5cbcd5cd92108831e1b27e23def46e5fc835274e919369c4cae7f7c7837c9331a387453ce558c258b7fee84b3097334137925e19030046ca52ad77aca7730dc06b0a39201d1791bd5c516caf41f200814aab820f851a02f25e85027b5795e809b7f90f9b2ecbb8a13813155f0579c61e2165677f9d5e68de10ab", 0xd0}, {&(0x7f0000000440)="20f106b54133e400152796131c5718fb65fc5602fabb3cc64cb1f881e20f5703d5816d09c5975eb9404379b2003cfe02dacf9e299ec97400c965cd9b0e30fd1c6cfe7dfe78aa53c2563ce7836322fa4e50b8877066354ffe5a855a3a66db952de49a36d9832d00b86706111cb2b033398e392005bcf20937320db602c9affc50547f6d345b6fbf0718edc04738d5acfab37489395cb9d139d62aef3ba6c315cb02a531f9988284ebd29faa937b7b802ce3872f623869a4fb5978", 0xba}, {&(0x7f0000000300)}, {&(0x7f0000000500)="f814a443e71b88c7c3748d0d32c5b46ba8e002fc4f9cb9f2ce3837a1453302a269fc2ab4797190dea78cc77c0c8f0e0367f7d4dfaa578ec69236030eaa9eddfe42a1065259a2258a3f753cdde9f68c1931cc0f6755cb105542dc38e651e87ae84fa78ac9ab49c745b8e9460dcf15c88ba03df7f3689bbdf3", 0x78}, {&(0x7f0000000580)="17335a3d01362c153b5073d2a227460c69cee8b5a467b123abf955c41589026c8efe54d50b", 0x25}, {&(0x7f00000005c0)="878c27ae2bb651ad395a", 0xa}, {&(0x7f0000000600)="dea6cc07285471b3354e30175a9ae35bb86d4373898cf206f556a887f10ce24a2a8ce647f80a0025fdc1de74c092255d9bad74e418be9a33b6bcb868e190df98b888f710e1726c742716a926cc0dc9808be428030e3d2c74eb7ba30322e4a80d7c250887c4cb08b8ff98217a66623b6a4e553dbfd11c2fc97a0019ea1f6812f710c8c45fdcc80324476b56af73d3138a97999b5c25e63ce789eaed01f6f6cf743183d899b173a526d10ac7ea54959dff27f13719a175", 0xb6}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="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", 0x1000}], 0xa, 0xa1c8) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) ptrace$getregset(0x4204, r2, 0x3, &(0x7f0000002840)={&(0x7f0000000300)=""/19, 0x13}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b, 0x0, 0x9, 0x0, 0x0, 0x3}, r2, 0xc, 0xffffffffffffffff, 0xc) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:33 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 20:09:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x8100}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r3, 0x5}, 0x1c}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) write$P9_RRENAME(r1, &(0x7f0000000080)={0x7, 0x15, 0x1}, 0x7) sendmmsg(r5, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r4, &(0x7f0000000040)=""/59, 0x3b, 0x40000103, 0x0, 0x0) 20:09:33 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) [ 660.499722] CIFS VFS: Device name not specified. [ 660.530550] CIFS VFS: Malformed UNC in devname. 20:09:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xb606}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:33 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) sendfile(0xffffffffffffffff, r1, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:33 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='minix\x00', 0xc0fd0043, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="03000000000000000080000000000000d495e20743a5abb991b6a8360f596debb89fbcdde9f65d82590a4daa5c930557319da58e62c563872082c5d48338a0f1297acd12b316e88f8d5ec2b51d0994a9bef1e08402d08c50ab20c2a8c348be563fc5f386f92d8ed34aa212e56e40ad6ad44c1c97a5010e85ccfaf7"], 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x80000001, 0x0) renameat2(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x0) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r6, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 660.843010] device macsec0 left promiscuous mode 20:09:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xf000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:34 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x80000001, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x6, @empty, 0x1}, {0xa, 0x4e22, 0x1000, @dev={0xfe, 0x80, [], 0x1a}, 0x2}, r5, 0x2}}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r7 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r7, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r6, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r3, 0x5}, 0x1c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x7f, 0x8}, 'port0\x00', 0x5c, 0x21008, 0x80, 0x1, 0xbd, 0x4, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x80c) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:34 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xf0ffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 661.436293] device veth1_macvtap entered promiscuous mode [ 661.487980] device macsec0 entered promiscuous mode 20:09:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x5}, 0x1c}}, 0x0) r9 = open$dir(&(0x7f0000000580)='./file0\x00', 0x214081, 0x11) close(r9) splice(r3, 0x0, r4, 0x0, 0x80000001, 0x0) write$FUSE_INTERRUPT(r3, &(0x7f0000000100)={0x10, 0x24, 0x3}, 0x10) r10 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r10, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r10, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}, {{&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @empty}, 0x1, 0x4, 0x2}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)}, {&(0x7f0000000180)="fea4c52f39848eecb395bfc508eef360f6c465c0363aced7328907fb62026b875c744f8a549a1f6a682b124e08b180b86ada79d9d8057ef6c68d3b9fccf010525f6f3bd06183008e8e06a866a851b71729b7dfef1184a007feabd264a80d13ccb5239f49ca86b7ae42224102ce3ea5e002f0448b627ed2f7270c59f314c2c89a679e3250941f16e42488b50893948a3fa12501fe01b42079de5d631e8f413f61c78839aeb09a6e8d24220514814ac19943a6834bb3f6d589bbf77a9043ff9bc01e549f78847e82bfd7293193e7cb3fd1e70a271b3272c1a45d5e344613b836f5136fe85333", 0xe5}, {&(0x7f0000000280)="36deee75259a5708fc049fe56f1736c6aaed15bec48f7fd4507390f91331a7d33c5196a24f74253b1a3edbec506039dd0b4cd4a9676a6473daa16fe46895a6809a9ac5c2e67aa2d83d", 0x49}], 0x3, &(0x7f0000000380)=[{0x60, 0x111, 0x8, "3b45ea23e4d8445401c10a38a661808c0db8ebb4f964daa29e6cfb2637c4ecf02210cc62a59b39354caf1c15902411fd4477c84b02a321c7c8d589fe8360296c9a06036dbc52ca39d4e69d"}, {0xf0, 0x19e, 0x76, "d4796f5e0b57d5928ef2e0e009a4233cd316bcc1c4c7496e3a59e07c365810218ac4a2b77cb98b5c6a89e302c4942056201755ebf819509ae63f6f8b61bb388ba3b85feb78d77f0be0edb56e7c3a73eb2bd68b50a096fac1c45b04611e1bfa2283505154e46d1339035c226104f0a8b85fe8f2eb850363feec1ae30ed4c5317233b76610bfc3fd64865fe63cbd00655731e9621939e842364db0a88d61247b29074a9b46e567c01eb5f667837b2db08a2a825382710b5db0e433e9698e5201bbec40b2df5119d53222dcd6070c7f392310f3277d85a0eb18d6"}], 0x150}}], 0x2, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 661.521124] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 661.588703] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 20:09:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x1000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:34 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) sendfile(0xffffffffffffffff, r1, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:34 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x0, 0x0, 0xffffffffffffffff, 0x7}) 20:09:34 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d730fffffffffffffffd9a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x1e8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, &(0x7f0000000200)) ptrace(0x10, r1) ptrace(0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000840)=@getae={0x2a4, 0x1f, 0x2, 0x70bd27, 0x25dfdbfd, {{@in6=@empty, 0x4d3, 0x2, 0xff}, @in=@rand_addr=0x3, 0xfffffb2c}, [@tfcpad={0x8, 0x16, 0xfffffffc}, @lifetime_val={0x24, 0x9, {0x10001, 0xfff, 0x5, 0x2}}, @srcaddr={0x14, 0xd, @in6=@empty}, @tmpl={0x184, 0x5, [{{@in6=@empty, 0x4d6, 0x32}, 0xa, @in=@remote, 0x3506, 0x0, 0x3, 0x2, 0x9, 0x5, 0x1000}, {{@in=@local, 0x4d3, 0x2b}, 0x2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x1, 0x3, 0x3f, 0x9, 0x3, 0x1}, {{@in6=@loopback, 0x4d3, 0x2b}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x3, 0x5, 0xe99, 0x6, 0x3}, {{@in=@broadcast, 0x4d4, 0x3c}, 0x2, @in=@broadcast, 0x3507, 0x0, 0x1, 0x3, 0x7, 0x20, 0x5}, {{@in=@multicast1, 0x4d5, 0x2b}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x3504, 0x2, 0x3, 0x8, 0x1, 0x5, 0x4}, {{@in6=@dev={0xfe, 0x80, [], 0x1c}, 0x4d6, 0xe}, 0xa, @in=@empty, 0x34ff, 0x2, 0x1, 0x7, 0x99, 0x1bfae5a2}]}, @algo_aead={0xa0, 0x12, {{'rfc4309(generic-gcm-aesni)\x00'}, 0x2a0, 0x180, "25e90d773bc85aaa10c85e06c5e238bd726d0f97bcdfd9cceb21cacce07dcc282d0df34009e66bcfe9e6031d6d13c01bdc6d9ae06d0755545efecc5931699098aa4d6f825e984b0152b282eb2d106f01d350e588"}}]}, 0x2a4}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000080)={0x1c, r3, 0x5}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x804) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x5}, 0x1c}}, 0x0) r9 = dup3(r2, r7, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r9, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r1, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:09:34 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x0, 0x0, 0xffffffffffffffff, 0x7}) [ 661.915797] device veth1_macvtap left promiscuous mode [ 661.929297] device macsec0 left promiscuous mode 20:09:35 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) sendfile(0xffffffffffffffff, r1, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:35 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0x0, 0x0, 0xffffffffffffffff, 0x7}) 20:09:35 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket$inet6(0xa, 0x5, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r1, 0x0) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r3 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @remote, @loopback}, 0xc) ioctl$FICLONE(r1, 0x40049409, r2) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00', r5}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x404001}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x200, 0x1, @rand_addr="faaf87d73084fccf886100", 0x9}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r6 = getpid() rt_tgsigqueueinfo(0x0, r6, 0x0, &(0x7f0000000200)) ptrace(0x10, r6) ptrace(0x2, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x5}, 0x1c}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r9, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r10, 0x5}, 0x1c}}, 0x0) r11 = dup3(r7, r9, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r11, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r6, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 20:09:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x2000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000040)) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x3000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 662.616170] CIFS VFS: Device name not specified. [ 662.652587] CIFS VFS: Malformed UNC in devname. 20:09:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x4000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:35 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000200)) ptrace(0x10, r2) ptrace(0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x40, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b, 0x0, 0x0, 0x0, 0x2}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, &(0x7f000000a000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000100)) 20:09:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x6000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r3, 0x5}, 0x1c}}, 0x0) signalfd(r2, &(0x7f0000000000)={[0x20]}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000080)=0x4f, 0x4) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000180)={0x2, 0x0, &(0x7f0000000100)=[0x0, 0x0]}) sendmmsg(r5, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r4, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) uselib(&(0x7f00000001c0)='./file0\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000040)=0x100, 0x4) 20:09:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xa000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:36 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x1000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:36 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xc000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 663.285052] device veth1_macvtap left promiscuous mode [ 663.661051] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 663.692744] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 663.706597] CPU: 1 PID: 6166 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 663.714436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.723802] Call Trace: [ 663.726415] dump_stack+0x197/0x210 [ 663.730068] warn_alloc.cold+0x7b/0x173 [ 663.734063] ? zone_watermark_ok_safe+0x260/0x260 [ 663.738926] ? __lock_is_held+0xb6/0x140 [ 663.743024] __alloc_pages_slowpath+0x2214/0x2870 [ 663.747901] ? warn_alloc+0x110/0x110 [ 663.751720] ? __lock_is_held+0xb6/0x140 [ 663.755802] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 663.761355] ? should_fail+0x14d/0x85c [ 663.765268] ? __isolate_free_page+0x4c0/0x4c0 [ 663.769872] ? __might_sleep+0x95/0x190 [ 663.773864] __alloc_pages_nodemask+0x617/0x750 [ 663.778560] ? __alloc_pages_slowpath+0x2870/0x2870 [ 663.783602] ? fs_reclaim_acquire+0x20/0x20 [ 663.787943] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 663.793501] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 663.799235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.804808] alloc_pages_current+0x107/0x210 [ 663.809252] ion_page_pool_alloc+0x17f/0x270 [ 663.813700] ion_system_heap_allocate+0x154/0xa90 [ 663.818578] ? ion_system_heap_free+0x250/0x250 [ 663.823276] ? ion_alloc+0x306/0x900 [ 663.827153] ion_alloc+0x29b/0x900 [ 663.830717] ? ion_dma_buf_release+0x50/0x50 [ 663.835156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 663.840710] ? _copy_from_user+0xdd/0x150 [ 663.844881] ion_ioctl+0x17b/0x329 [ 663.848446] ? ion_alloc.cold+0x28/0x28 [ 663.852437] ? __might_sleep+0x95/0x190 [ 663.856431] ? ion_alloc.cold+0x28/0x28 [ 663.860423] do_vfs_ioctl+0xd5f/0x1380 [ 663.864335] ? selinux_file_ioctl+0x46c/0x5d0 [ 663.868855] ? selinux_file_ioctl+0x125/0x5d0 [ 663.873366] ? ioctl_preallocate+0x210/0x210 [ 663.877794] ? selinux_file_mprotect+0x620/0x620 [ 663.882571] ? iterate_fd+0x360/0x360 [ 663.886388] ? nsecs_to_jiffies+0x30/0x30 [ 663.890552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.896109] ? security_file_ioctl+0x8d/0xc0 [ 663.900538] ksys_ioctl+0xab/0xd0 [ 663.904021] __x64_sys_ioctl+0x73/0xb0 [ 663.907928] do_syscall_64+0xfd/0x620 [ 663.911748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.916945] RIP: 0033:0x45b399 [ 663.920153] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 663.939084] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 663.946824] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 663.954108] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 663.961482] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 663.968769] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 663.976317] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 664.001873] warn_alloc_show_mem: 1 callbacks suppressed [ 664.001878] Mem-Info: 20:09:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xe000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x480200, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x10001, 0x0, 0x3, 0x2}, 0x10) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 664.011140] active_anon:332062 inactive_anon:207 isolated_anon:3 [ 664.011140] active_file:2867 inactive_file:3835 isolated_file:12 [ 664.011140] unevictable:0 dirty:168 writeback:0 unstable:0 [ 664.011140] slab_reclaimable:15631 slab_unreclaimable:113425 [ 664.011140] mapped:57955 shmem:397 pagetables:4567 bounce:0 [ 664.011140] free:902323 free_pcp:233 free_cma:0 20:09:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x1000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xf000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x10000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:37 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 664.297277] Node 0 active_anon:1330432kB inactive_anon:828kB active_file:10940kB inactive_file:13968kB unevictable:0kB isolated(anon):12kB isolated(file):48kB mapped:230536kB dirty:664kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 595968kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 20:09:37 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x3f000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 664.487823] Node 0 DMA free:10448kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 664.687845] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 664.709820] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 664.725201] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 20:09:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x40000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 664.736744] Node 0 DMA32 free:56580kB min:36168kB low:45208kB high:54248kB active_anon:1330444kB inactive_anon:820kB active_file:11820kB inactive_file:12056kB unevictable:0kB writepending:684kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12288kB pagetables:18520kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 664.746822] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 664.801396] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 664.822341] CPU: 1 PID: 6185 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 664.830195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.839566] Call Trace: [ 664.842174] dump_stack+0x197/0x210 [ 664.845851] warn_alloc.cold+0x7b/0x173 [ 664.849842] ? zone_watermark_ok_safe+0x260/0x260 [ 664.854706] ? __lock_is_held+0xb6/0x140 [ 664.858794] __alloc_pages_slowpath+0x2214/0x2870 [ 664.863677] ? warn_alloc+0x110/0x110 [ 664.867501] ? __lock_is_held+0xb6/0x140 [ 664.871591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.876849] lowmem_reserve[]: 0 0 1 1 1 [ 664.877159] ? should_fail+0x14d/0x85c [ 664.885035] ? __isolate_free_page+0x4c0/0x4c0 [ 664.889641] ? __might_sleep+0x95/0x190 [ 664.893686] __alloc_pages_nodemask+0x617/0x750 [ 664.894680] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 664.898385] ? __alloc_pages_slowpath+0x2870/0x2870 [ 664.898411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.898427] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 664.898446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.946022] alloc_pages_current+0x107/0x210 [ 664.950458] ion_page_pool_alloc+0x17f/0x270 [ 664.954889] ion_system_heap_allocate+0x154/0xa90 [ 664.959757] ? ion_system_heap_free+0x250/0x250 [ 664.964449] ? ion_alloc+0x306/0x900 [ 664.968187] ion_alloc+0x29b/0x900 [ 664.971891] ? ion_dma_buf_release+0x50/0x50 [ 664.976326] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.981884] ? _copy_from_user+0xdd/0x150 [ 664.986056] ion_ioctl+0x17b/0x329 [ 664.989615] ? ion_alloc.cold+0x28/0x28 [ 664.993700] ? __might_sleep+0x95/0x190 [ 664.997702] ? ion_alloc.cold+0x28/0x28 [ 665.001975] do_vfs_ioctl+0xd5f/0x1380 [ 665.005878] ? selinux_file_ioctl+0x46c/0x5d0 [ 665.010394] ? selinux_file_ioctl+0x125/0x5d0 [ 665.014087] lowmem_reserve[]: 0 0 0 0 0 [ 665.014926] ? ioctl_preallocate+0x210/0x210 [ 665.023311] ? selinux_file_mprotect+0x620/0x620 [ 665.028094] ? iterate_fd+0x360/0x360 [ 665.031923] ? nsecs_to_jiffies+0x30/0x30 [ 665.033603] Node 0 DMA: 2*4kB (U) 3*8kB (UE) 7*16kB (U) 8*32kB (UE) 1*64kB (E) 4*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10448kB [ 665.036088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.036107] ? security_file_ioctl+0x8d/0xc0 [ 665.036126] ksys_ioctl+0xab/0xd0 [ 665.064342] __x64_sys_ioctl+0x73/0xb0 [ 665.068254] do_syscall_64+0xfd/0x620 [ 665.072084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.077291] RIP: 0033:0x45b399 [ 665.080486] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.099398] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 665.101686] Node 0 DMA32: 914*4kB (UE) 433*8kB (UE) 1498*16kB (UE) 762*32kB (UME) 1*64kB (M) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 55536kB [ 665.107128] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 665.107138] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 665.107152] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 665.107160] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 665.107169] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 665.185644] CPU: 0 PID: 6190 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 665.193484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.202853] Call Trace: [ 665.205468] dump_stack+0x197/0x210 [ 665.209123] warn_alloc.cold+0x7b/0x173 [ 665.213121] ? zone_watermark_ok_safe+0x260/0x260 [ 665.217997] ? compaction_deferred+0x16a/0x3b0 [ 665.222607] ? try_to_compact_pages+0x44/0xae0 [ 665.227230] __alloc_pages_slowpath+0x2214/0x2870 [ 665.232108] ? warn_alloc+0x110/0x110 [ 665.235918] ? __lock_is_held+0xb6/0x140 [ 665.239994] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 665.245548] ? should_fail+0x14d/0x85c [ 665.249463] ? __isolate_free_page+0x4c0/0x4c0 [ 665.254072] ? __might_sleep+0x95/0x190 [ 665.258768] __alloc_pages_nodemask+0x617/0x750 [ 665.263472] ? __alloc_pages_slowpath+0x2870/0x2870 [ 665.268517] ? fs_reclaim_acquire+0x20/0x20 [ 665.272864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 665.278434] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 665.284161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.289722] alloc_pages_current+0x107/0x210 [ 665.294160] ion_page_pool_alloc+0x17f/0x270 [ 665.298591] ion_system_heap_allocate+0x154/0xa90 [ 665.303473] ? ion_system_heap_free+0x250/0x250 [ 665.308165] ? ion_alloc+0x306/0x900 [ 665.311901] ion_alloc+0x29b/0x900 [ 665.315469] ? ion_dma_buf_release+0x50/0x50 [ 665.319902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 665.325457] ? _copy_from_user+0xdd/0x150 [ 665.329739] ion_ioctl+0x17b/0x329 [ 665.333320] ? ion_alloc.cold+0x28/0x28 [ 665.337333] ? __might_sleep+0x95/0x190 [ 665.341709] ? ion_alloc.cold+0x28/0x28 [ 665.345708] do_vfs_ioctl+0xd5f/0x1380 [ 665.347340] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB [ 665.349624] ? selinux_file_ioctl+0x46c/0x5d0 [ 665.349710] 0*1024kB 0*2048kB 0*4096kB = 0kB [ 665.357637] ? selinux_file_ioctl+0x125/0x5d0 [ 665.357656] ? ioctl_preallocate+0x210/0x210 [ 665.357671] ? selinux_file_mprotect+0x620/0x620 [ 665.357692] ? iterate_fd+0x360/0x360 [ 665.357709] ? nsecs_to_jiffies+0x30/0x30 [ 665.357730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.357748] ? security_file_ioctl+0x8d/0xc0 [ 665.357764] ksys_ioctl+0xab/0xd0 [ 665.357782] __x64_sys_ioctl+0x73/0xb0 [ 665.395101] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 665.398196] do_syscall_64+0xfd/0x620 [ 665.398218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.413029] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 665.414412] RIP: 0033:0x45b399 [ 665.414427] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.414438] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 665.421645] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 665.423430] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 665.423439] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 665.423447] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 665.423454] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 665.423463] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 665.527063] Mem-Info: [ 665.550280] active_anon:331521 inactive_anon:205 isolated_anon:0 [ 665.550280] active_file:3197 inactive_file:3234 isolated_file:24 [ 665.550280] unevictable:0 dirty:173 writeback:0 unstable:0 [ 665.550280] slab_reclaimable:15640 slab_unreclaimable:113481 [ 665.550280] mapped:57811 shmem:397 pagetables:4593 bounce:0 [ 665.550280] free:902181 free_pcp:282 free_cma:0 [ 665.679807] Node 0 active_anon:1326204kB inactive_anon:828kB active_file:11928kB inactive_file:11852kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:229936kB dirty:712kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 591872kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 665.729972] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 665.748977] 6861 total pagecache pages [ 665.767983] 0 pages in swap cache [ 665.787563] Swap cache stats: add 0, delete 0, find 0/0 [ 665.801323] Free swap = 0kB [ 665.807045] Node 0 DMA free:10448kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 665.814115] Total swap = 0kB [ 665.854697] 1965979 pages RAM [ 665.863709] 0 pages HighMem/MovableOnly [ 665.868113] 341741 pages reserved [ 665.872787] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 665.877040] 0 pages cma reserved 20:09:38 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x60000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x20001, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000080)=0x1f, r6, 0x0, 0x0, 0x1}}, 0x20) 20:09:38 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 665.899428] Node 0 DMA32 free:53472kB min:36168kB low:45208kB high:54248kB active_anon:1324028kB inactive_anon:828kB active_file:11928kB inactive_file:11952kB unevictable:0kB writepending:712kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12064kB pagetables:18092kB bounce:0kB free_pcp:928kB local_pcp:460kB free_cma:0kB [ 665.972372] lowmem_reserve[]: 0 0 1 1 1 [ 665.976725] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 20:09:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x65580000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 666.037165] lowmem_reserve[]: 0 0 0 0 0 [ 666.045766] Node 0 DMA: 2*4kB (U) 3*8kB (UE) 7*16kB (U) 8*32kB (UE) 1*64kB (E) 4*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10448kB 20:09:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x3, 0xfffffffc, 0xffff, 0x7, 0x20, 0x9d, 0x10000}, 0x1c) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 666.088703] Node 0 DMA32: 1*4kB (U) 182*8kB (UME) 1229*16kB (UE) 773*32kB (UE) 1*64kB (U) 0*128kB 0*256kB 0*512kB 18*1024kB (U) 6*2048kB (UM) 0*4096kB = 76644kB [ 666.157000] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 666.189271] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 20:09:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x81000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 666.216683] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 666.251692] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 666.292409] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 666.332377] 6898 total pagecache pages [ 666.336327] 0 pages in swap cache [ 666.339793] Swap cache stats: add 0, delete 0, find 0/0 20:09:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x88a8ffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 666.382274] Free swap = 0kB [ 666.385775] Total swap = 0kB [ 666.391293] 1965979 pages RAM [ 666.405804] 0 pages HighMem/MovableOnly [ 666.426562] 341741 pages reserved [ 666.438215] 0 pages cma reserved [ 666.476321] device veth1_macvtap entered promiscuous mode [ 666.504476] device macsec0 entered promiscuous mode 20:09:39 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 666.521877] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 666.546241] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 20:09:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x9effffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xb6060000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 666.899014] device veth1_macvtap left promiscuous mode [ 666.916978] device macsec0 left promiscuous mode [ 666.927570] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 666.930744] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 666.939435] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 666.999142] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 666.999363] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 667.011671] CPU: 0 PID: 6236 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 667.019509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.028970] Call Trace: [ 667.032104] dump_stack+0x197/0x210 [ 667.035769] warn_alloc.cold+0x7b/0x173 [ 667.039876] ? zone_watermark_ok_safe+0x260/0x260 [ 667.044006] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 667.044733] ? __lock_is_held+0xb6/0x140 [ 667.054225] __alloc_pages_slowpath+0x2214/0x2870 [ 667.059212] ? warn_alloc+0x110/0x110 [ 667.063020] ? __lock_is_held+0xb6/0x140 [ 667.067096] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.072653] ? should_fail+0x14d/0x85c [ 667.076552] ? __isolate_free_page+0x4c0/0x4c0 [ 667.081144] ? __might_sleep+0x95/0x190 [ 667.085136] __alloc_pages_nodemask+0x617/0x750 [ 667.089823] ? __alloc_pages_slowpath+0x2870/0x2870 [ 667.094853] ? fs_reclaim_acquire+0x20/0x20 [ 667.099879] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.105446] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 667.111179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.116737] alloc_pages_current+0x107/0x210 [ 667.121235] ion_page_pool_alloc+0x17f/0x270 [ 667.125664] ion_system_heap_allocate+0x154/0xa90 [ 667.130533] ? ion_system_heap_free+0x250/0x250 [ 667.135228] ? ion_alloc+0x306/0x900 [ 667.138947] ion_alloc+0x29b/0x900 [ 667.142503] ? ion_dma_buf_release+0x50/0x50 [ 667.146933] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.152502] ? _copy_from_user+0xdd/0x150 [ 667.156674] ion_ioctl+0x17b/0x329 [ 667.160238] ? ion_alloc.cold+0x28/0x28 [ 667.164255] ? __might_sleep+0x95/0x190 [ 667.168251] ? ion_alloc.cold+0x28/0x28 [ 667.172238] do_vfs_ioctl+0xd5f/0x1380 [ 667.176151] ? selinux_file_ioctl+0x46c/0x5d0 [ 667.180661] ? selinux_file_ioctl+0x125/0x5d0 [ 667.186137] ? ioctl_preallocate+0x210/0x210 [ 667.190564] ? selinux_file_mprotect+0x620/0x620 [ 667.195348] ? iterate_fd+0x360/0x360 [ 667.199183] ? nsecs_to_jiffies+0x30/0x30 [ 667.203362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.208909] ? security_file_ioctl+0x8d/0xc0 [ 667.213325] ksys_ioctl+0xab/0xd0 [ 667.216804] __x64_sys_ioctl+0x73/0xb0 [ 667.220711] do_syscall_64+0xfd/0x620 [ 667.224529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.231030] RIP: 0033:0x45b399 [ 667.234236] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 667.253411] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 667.261142] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 667.268422] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 667.275695] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 667.282986] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 667.290268] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 667.298233] CPU: 1 PID: 6213 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 667.306070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.315437] Call Trace: [ 667.318058] dump_stack+0x197/0x210 [ 667.322704] warn_alloc.cold+0x7b/0x173 [ 667.326891] ? zone_watermark_ok_safe+0x260/0x260 [ 667.332202] ? __lock_is_held+0xb6/0x140 [ 667.336321] __alloc_pages_slowpath+0x2214/0x2870 [ 667.341218] ? warn_alloc+0x110/0x110 [ 667.345047] ? __lock_is_held+0xb6/0x140 [ 667.350092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.355664] ? should_fail+0x14d/0x85c [ 667.359582] ? __isolate_free_page+0x4c0/0x4c0 [ 667.364291] ? __might_sleep+0x95/0x190 [ 667.368299] __alloc_pages_nodemask+0x617/0x750 [ 667.373010] ? __alloc_pages_slowpath+0x2870/0x2870 [ 667.378051] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.383640] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 667.385782] warn_alloc_show_mem: 1 callbacks suppressed [ 667.385787] Mem-Info: [ 667.389366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.389388] alloc_pages_current+0x107/0x210 [ 667.389412] ion_page_pool_alloc+0x17f/0x270 [ 667.389432] ion_system_heap_allocate+0x154/0xa90 [ 667.389458] ? ion_system_heap_free+0x250/0x250 [ 667.389476] ? ion_alloc+0x306/0x900 [ 667.389495] ion_alloc+0x29b/0x900 [ 667.398614] active_anon:331546 inactive_anon:208 isolated_anon:23 [ 667.398614] active_file:2062 inactive_file:2333 isolated_file:1 [ 667.398614] unevictable:0 dirty:186 writeback:0 unstable:0 [ 667.398614] slab_reclaimable:15579 slab_unreclaimable:113928 [ 667.398614] mapped:55815 shmem:397 pagetables:4578 bounce:0 [ 667.398614] free:901776 free_pcp:456 free_cma:0 [ 667.402795] ? ion_dma_buf_release+0x50/0x50 [ 667.402821] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.402836] ? _copy_from_user+0xdd/0x150 [ 667.402856] ion_ioctl+0x17b/0x329 [ 667.402874] ? ion_alloc.cold+0x28/0x28 [ 667.402898] ? __might_sleep+0x95/0x190 [ 667.407709] Node 0 active_anon:1326184kB inactive_anon:832kB active_file:7328kB inactive_file:8160kB unevictable:0kB isolated(anon):92kB isolated(file):4kB mapped:221820kB dirty:736kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 595968kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 667.411784] ? ion_alloc.cold+0x28/0x28 [ 667.411802] do_vfs_ioctl+0xd5f/0x1380 [ 667.411820] ? selinux_file_ioctl+0x46c/0x5d0 [ 667.411837] ? selinux_file_ioctl+0x125/0x5d0 [ 667.411852] ? ioctl_preallocate+0x210/0x210 [ 667.411870] ? selinux_file_mprotect+0x620/0x620 [ 667.411894] ? iterate_fd+0x360/0x360 [ 667.411913] ? nsecs_to_jiffies+0x30/0x30 [ 667.411936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.433635] Node 0 DMA free:10456kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 667.462668] ? security_file_ioctl+0x8d/0xc0 [ 667.462689] ksys_ioctl+0xab/0xd0 [ 667.462707] __x64_sys_ioctl+0x73/0xb0 [ 667.462725] do_syscall_64+0xfd/0x620 [ 667.462744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.462755] RIP: 0033:0x45b399 [ 667.462770] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 667.462778] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 667.462794] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 667.462803] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 667.462812] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 667.462821] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 667.462830] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 667.471581] CPU: 1 PID: 6215 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 667.559799] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 667.583912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.583918] Call Trace: [ 667.583941] dump_stack+0x197/0x210 [ 667.583963] warn_alloc.cold+0x7b/0x173 [ 667.583981] ? zone_watermark_ok_safe+0x260/0x260 [ 667.583995] ? __lock_is_held+0xb6/0x140 [ 667.584030] __alloc_pages_slowpath+0x2214/0x2870 [ 667.617766] Node 0 DMA32 free:58900kB min:36168kB low:45208kB high:54248kB active_anon:1326276kB inactive_anon:832kB active_file:8252kB inactive_file:8008kB unevictable:0kB writepending:736kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12160kB pagetables:18460kB bounce:0kB free_pcp:2004kB local_pcp:704kB free_cma:0kB [ 667.628162] ? warn_alloc+0x110/0x110 [ 667.628178] ? __lock_is_held+0xb6/0x140 [ 667.628195] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.628214] ? should_fail+0x14d/0x85c [ 667.642765] lowmem_reserve[]: 0 0 1 1 1 [ 667.643195] ? __isolate_free_page+0x4c0/0x4c0 [ 667.662351] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 667.665027] ? __might_sleep+0x95/0x190 [ 667.665054] __alloc_pages_nodemask+0x617/0x750 [ 667.679178] lowmem_reserve[]: 0 0 0 0 0 [ 667.680136] ? __alloc_pages_slowpath+0x2870/0x2870 [ 667.693072] Node 0 DMA: 2*4kB (U) 4*8kB (UE) 7*16kB (U) 8*32kB (UE) 1*64kB (E) 4*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10456kB [ 667.695118] ? retint_kernel+0x2d/0x2d [ 667.695137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.699976] Node 0 DMA32: 1435*4kB (UME) 703*8kB (UME) 1175*16kB (UME) 787*32kB (UME) 3*64kB (UM) 0*128kB 1*256kB (M) 0*512kB 1*1024kB (M) 1*2048kB (M) 0*4096kB = 58868kB [ 667.701341] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 667.701359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.712105] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 667.714224] alloc_pages_current+0x107/0x210 [ 667.714250] ion_page_pool_alloc+0x17f/0x270 [ 667.714271] ion_system_heap_allocate+0x154/0xa90 [ 667.721451] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 20:09:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r4, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ioctl$FICLONE(r4, 0x40049409, r5) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000480)={'team0\x00', r8}) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x404001}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000180)=""/159, &(0x7f0000000040)=0x9f) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r9, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r10, 0x5}, 0x1c}}, 0x0) write$binfmt_misc(r9, &(0x7f00000004c0)={'syz1', "898771c1c1a7512cce8e6f77468ca757d72fc761f4d8bc3a38a9c0dea32f81573aa4e7a24c74220b5ad54e145f397052bce85c6d5ec18e4134c71b17ccb7ad23c2ebed1227ffc08209a39c53904350e32d1af71938ea6a6ca561d74392a1d931ce7b2edfcd97305fe3aa8dec592aedae23ec6933cda824de045ade86908b96d714f0b3b045b8d2b99c528732710a1991ed0d3a4db3259a2fee73b16d08d41f56e1d0794ca7b8ca69836fdb426d01825f6f7ca4ee5cd1e5fb84dcd8821e2e"}, 0xc2) [ 667.748914] ? ion_system_heap_free+0x250/0x250 [ 667.748937] ? ion_alloc+0x306/0x900 [ 667.748955] ion_alloc+0x29b/0x900 [ 667.748982] ? ion_dma_buf_release+0x50/0x50 [ 667.753629] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 667.756962] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.756980] ? _copy_from_user+0xdd/0x150 [ 667.756999] ion_ioctl+0x17b/0x329 [ 667.757015] ? ion_alloc.cold+0x28/0x28 [ 667.757035] ? __might_sleep+0x95/0x190 [ 667.757050] ? ion_alloc.cold+0x28/0x28 [ 667.757067] do_vfs_ioctl+0xd5f/0x1380 [ 667.757083] ? selinux_file_ioctl+0x46c/0x5d0 [ 667.757102] ? selinux_file_ioctl+0x125/0x5d0 [ 667.775725] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 667.801306] ? ioctl_preallocate+0x210/0x210 [ 667.801325] ? selinux_file_mprotect+0x620/0x620 [ 667.801345] ? iterate_fd+0x360/0x360 [ 667.801362] ? nsecs_to_jiffies+0x30/0x30 [ 667.801385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.842398] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 667.843556] ? security_file_ioctl+0x8d/0xc0 [ 667.843577] ksys_ioctl+0xab/0xd0 [ 667.879124] 4902 total pagecache pages [ 667.880856] __x64_sys_ioctl+0x73/0xb0 [ 667.880877] do_syscall_64+0xfd/0x620 [ 667.892079] 0 pages in swap cache [ 667.894548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.894561] RIP: 0033:0x45b399 [ 667.894575] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 667.894588] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 667.918012] Swap cache stats: add 0, delete 0, find 0/0 [ 667.919750] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 667.919760] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 667.919770] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 667.919783] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 667.940824] Free swap = 0kB 20:09:41 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:41 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xc3ffffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 667.941608] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 667.951270] Total swap = 0kB [ 668.122992] 1965979 pages RAM [ 668.129302] 0 pages HighMem/MovableOnly [ 668.184809] 341741 pages reserved [ 668.192717] 0 pages cma reserved 20:09:41 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = socket(0xa, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r2, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r1, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r3, 0x0) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r5 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000140)={r7, @remote, @loopback}, 0xc) ioctl$FICLONE(r3, 0x40049409, r4) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000480)={'team0\x00', r7}) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x404001}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000) bind$rxrpc(r4, &(0x7f0000000000)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0x810, @loopback, 0xfffffffb}}, 0x24) [ 668.322534] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 668.329720] device veth1_macvtap entered promiscuous mode [ 668.375897] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 668.385422] device macsec0 entered promiscuous mode [ 668.399048] CPU: 0 PID: 6261 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 668.401201] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 668.406883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.406890] Call Trace: [ 668.406917] dump_stack+0x197/0x210 [ 668.406943] warn_alloc.cold+0x7b/0x173 [ 668.406961] ? zone_watermark_ok_safe+0x260/0x260 [ 668.406976] ? compaction_deferred+0x16a/0x3b0 [ 668.406995] ? try_to_compact_pages+0x44/0xae0 [ 668.407028] __alloc_pages_slowpath+0x2214/0x2870 [ 668.407062] ? warn_alloc+0x110/0x110 [ 668.407077] ? __lock_is_held+0xb6/0x140 [ 668.407092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 668.407114] ? should_fail+0x14d/0x85c [ 668.420253] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 668.422734] ? __isolate_free_page+0x4c0/0x4c0 [ 668.422759] ? __might_sleep+0x95/0x190 [ 668.422788] __alloc_pages_nodemask+0x617/0x750 [ 668.422810] ? __alloc_pages_slowpath+0x2870/0x2870 [ 668.422832] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 668.422851] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 668.422869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.510851] alloc_pages_current+0x107/0x210 [ 668.515266] ion_page_pool_alloc+0x17f/0x270 [ 668.519669] ion_system_heap_allocate+0x154/0xa90 [ 668.524522] ? ion_system_heap_free+0x250/0x250 [ 668.529182] ? ion_alloc+0x306/0x900 [ 668.532910] ion_alloc+0x29b/0x900 [ 668.536452] ? ion_dma_buf_release+0x50/0x50 [ 668.540862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 668.546395] ? _copy_from_user+0xdd/0x150 [ 668.550553] ion_ioctl+0x17b/0x329 [ 668.554105] ? ion_alloc.cold+0x28/0x28 [ 668.558087] ? __might_sleep+0x95/0x190 [ 668.562067] ? ion_alloc.cold+0x28/0x28 [ 668.566041] do_vfs_ioctl+0xd5f/0x1380 [ 668.569921] ? selinux_file_ioctl+0x46c/0x5d0 [ 668.574413] ? selinux_file_ioctl+0x125/0x5d0 [ 668.578900] ? ioctl_preallocate+0x210/0x210 [ 668.583324] ? selinux_file_mprotect+0x620/0x620 [ 668.588089] ? iterate_fd+0x360/0x360 [ 668.591886] ? nsecs_to_jiffies+0x30/0x30 [ 668.596047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.601583] ? security_file_ioctl+0x8d/0xc0 [ 668.606000] ksys_ioctl+0xab/0xd0 [ 668.609447] __x64_sys_ioctl+0x73/0xb0 [ 668.613330] do_syscall_64+0xfd/0x620 [ 668.617128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.622308] RIP: 0033:0x45b399 [ 668.625495] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.644485] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 668.652198] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 668.659477] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 668.666755] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 668.674035] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 668.681320] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 668.690152] warn_alloc_show_mem: 2 callbacks suppressed [ 668.690195] Mem-Info: [ 668.698550] active_anon:331525 inactive_anon:208 isolated_anon:0 [ 668.698550] active_file:2372 inactive_file:2363 isolated_file:0 [ 668.698550] unevictable:0 dirty:186 writeback:0 unstable:0 [ 668.698550] slab_reclaimable:15566 slab_unreclaimable:113905 [ 668.698550] mapped:55984 shmem:397 pagetables:4605 bounce:0 [ 668.698550] free:901255 free_pcp:279 free_cma:0 [ 668.735666] Node 0 active_anon:1326100kB inactive_anon:832kB active_file:8668kB inactive_file:9880kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:223796kB dirty:736kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 593920kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 668.775287] Node 0 DMA free:10456kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 668.823366] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 668.828763] Node 0 DMA32 free:51872kB min:36168kB low:45208kB high:54248kB active_anon:1326200kB inactive_anon:832kB active_file:10392kB inactive_file:10824kB unevictable:0kB writepending:716kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12256kB pagetables:18272kB bounce:0kB free_pcp:1308kB local_pcp:496kB free_cma:0kB 20:09:41 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xf0ffffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 668.899320] lowmem_reserve[]: 0 0 1 1 1 [ 668.907146] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 20:09:42 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xfcffffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 669.018443] lowmem_reserve[]: 0 0 0 0 0 [ 669.034787] Node 0 DMA: 2*4kB (U) 4*8kB (UE) 7*16kB (U) 8*32kB (UE) 1*64kB (E) 4*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10456kB 20:09:42 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 669.140658] Node 0 DMA32: 0*4kB 218*8kB (U) 1200*16kB (UE) 778*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 45840kB 20:09:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xfeffffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 669.185475] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB 20:09:42 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 669.227834] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 669.276904] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 669.321311] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 669.350678] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:09:42 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000180)=""/232) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 669.369487] 7332 total pagecache pages [ 669.386864] 0 pages in swap cache [ 669.403495] Swap cache stats: add 0, delete 0, find 0/0 [ 669.429096] Free swap = 0kB [ 669.432545] Total swap = 0kB [ 669.462364] 1965979 pages RAM [ 669.465611] 0 pages HighMem/MovableOnly [ 669.511811] 341741 pages reserved [ 669.524443] 0 pages cma reserved 20:09:42 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xffffa888}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 669.666350] device veth1_macvtap left promiscuous mode [ 669.690590] device macsec0 left promiscuous mode 20:09:42 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:42 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:43 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 670.111895] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 670.181973] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 670.185850] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 670.218164] CPU: 1 PID: 6299 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 670.226015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.235392] Call Trace: [ 670.238001] dump_stack+0x197/0x210 [ 670.238225] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 670.241642] warn_alloc.cold+0x7b/0x173 [ 670.241661] ? zone_watermark_ok_safe+0x260/0x260 [ 670.241680] ? compaction_deferred+0x16a/0x3b0 [ 670.260531] ? try_to_compact_pages+0x44/0xae0 [ 670.265151] __alloc_pages_slowpath+0x2214/0x2870 [ 670.270024] ? warn_alloc+0x110/0x110 [ 670.273835] ? __lock_is_held+0xb6/0x140 [ 670.277907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.283450] ? should_fail+0x14d/0x85c [ 670.287352] ? __isolate_free_page+0x4c0/0x4c0 [ 670.291943] ? __might_sleep+0x95/0x190 [ 670.295965] __alloc_pages_nodemask+0x617/0x750 [ 670.300654] ? __alloc_pages_slowpath+0x2870/0x2870 [ 670.305677] ? fs_reclaim_acquire+0x20/0x20 [ 670.310001] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.315546] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 670.321265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.326934] alloc_pages_current+0x107/0x210 [ 670.331359] ion_page_pool_alloc+0x17f/0x270 [ 670.335783] ion_system_heap_allocate+0x154/0xa90 [ 670.340657] ? ion_system_heap_free+0x250/0x250 [ 670.345351] ? ion_alloc+0x306/0x900 [ 670.349071] ion_alloc+0x29b/0x900 [ 670.352630] ? ion_dma_buf_release+0x50/0x50 [ 670.357046] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.362670] ? _copy_from_user+0xdd/0x150 [ 670.366817] ion_ioctl+0x17b/0x329 [ 670.370369] ? ion_alloc.cold+0x28/0x28 [ 670.374346] ? __might_sleep+0x95/0x190 [ 670.378323] ? ion_alloc.cold+0x28/0x28 [ 670.382299] do_vfs_ioctl+0xd5f/0x1380 [ 670.386195] ? selinux_file_ioctl+0x46c/0x5d0 [ 670.390685] ? selinux_file_ioctl+0x125/0x5d0 [ 670.395182] ? ioctl_preallocate+0x210/0x210 [ 670.399585] ? selinux_file_mprotect+0x620/0x620 [ 670.404343] ? iterate_fd+0x360/0x360 [ 670.408146] ? nsecs_to_jiffies+0x30/0x30 [ 670.412296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.417831] ? security_file_ioctl+0x8d/0xc0 [ 670.422238] ksys_ioctl+0xab/0xd0 [ 670.425688] __x64_sys_ioctl+0x73/0xb0 [ 670.429596] do_syscall_64+0xfd/0x620 [ 670.433396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.438585] RIP: 0033:0x45b399 [ 670.441866] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.460777] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 670.468499] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 670.475802] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 670.483070] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 670.490355] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 670.497650] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 670.505089] CPU: 0 PID: 6324 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 670.512904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.512919] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 670.512929] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 670.522266] Call Trace: [ 670.522291] dump_stack+0x197/0x210 [ 670.522313] warn_alloc.cold+0x7b/0x173 [ 670.522330] ? zone_watermark_ok_safe+0x260/0x260 [ 670.522349] ? compaction_deferred+0x16a/0x3b0 [ 670.558806] ? try_to_compact_pages+0x44/0xae0 [ 670.563447] __alloc_pages_slowpath+0x2214/0x2870 [ 670.569229] ? warn_alloc+0x110/0x110 [ 670.573048] ? __lock_is_held+0xb6/0x140 [ 670.577137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.582799] ? should_fail+0x14d/0x85c [ 670.586805] ? __isolate_free_page+0x4c0/0x4c0 [ 670.591417] ? __might_sleep+0x95/0x190 [ 670.595443] __alloc_pages_nodemask+0x617/0x750 [ 670.600140] ? __alloc_pages_slowpath+0x2870/0x2870 [ 670.605183] ? fs_reclaim_acquire+0x20/0x20 [ 670.609531] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.615091] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 670.620816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.626375] alloc_pages_current+0x107/0x210 [ 670.630813] ion_page_pool_alloc+0x17f/0x270 [ 670.635251] ion_system_heap_allocate+0x154/0xa90 [ 670.640120] ? ion_system_heap_free+0x250/0x250 [ 670.644805] ? ion_alloc+0x306/0x900 [ 670.648542] ion_alloc+0x29b/0x900 [ 670.652111] ? ion_dma_buf_release+0x50/0x50 [ 670.656547] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.662104] ? _copy_from_user+0xdd/0x150 [ 670.666274] ion_ioctl+0x17b/0x329 [ 670.669839] ? ion_alloc.cold+0x28/0x28 [ 670.673834] ? __might_sleep+0x95/0x190 [ 670.677827] ? ion_alloc.cold+0x28/0x28 [ 670.681816] do_vfs_ioctl+0xd5f/0x1380 [ 670.685724] ? selinux_file_ioctl+0x46c/0x5d0 [ 670.690233] ? selinux_file_ioctl+0x125/0x5d0 [ 670.694743] ? ioctl_preallocate+0x210/0x210 [ 670.699167] ? selinux_file_mprotect+0x620/0x620 [ 670.703939] ? iterate_fd+0x360/0x360 [ 670.707763] ? nsecs_to_jiffies+0x30/0x30 [ 670.711936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.717489] ? security_file_ioctl+0x8d/0xc0 [ 670.722049] ksys_ioctl+0xab/0xd0 [ 670.725521] __x64_sys_ioctl+0x73/0xb0 [ 670.729430] do_syscall_64+0xfd/0x620 [ 670.733255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.738459] RIP: 0033:0x45b399 [ 670.741721] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.760747] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 670.768479] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 670.775772] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 670.783062] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 670.790460] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 670.797747] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 670.805159] CPU: 1 PID: 6308 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 670.813208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.822579] Call Trace: [ 670.825209] dump_stack+0x197/0x210 [ 670.828905] warn_alloc.cold+0x7b/0x173 [ 670.832915] ? zone_watermark_ok_safe+0x260/0x260 [ 670.837788] ? compaction_deferred+0x16a/0x3b0 [ 670.842407] ? try_to_compact_pages+0x44/0xae0 [ 670.847144] __alloc_pages_slowpath+0x2214/0x2870 [ 670.852044] ? warn_alloc+0x110/0x110 [ 670.855868] ? __lock_is_held+0xb6/0x140 [ 670.859969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.865530] ? should_fail+0x14d/0x85c [ 670.869448] ? __isolate_free_page+0x4c0/0x4c0 [ 670.874246] ? __might_sleep+0x95/0x190 [ 670.875647] Mem-Info: [ 670.878266] __alloc_pages_nodemask+0x617/0x750 [ 670.878287] ? __alloc_pages_slowpath+0x2870/0x2870 [ 670.878308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.880838] active_anon:331032 inactive_anon:208 isolated_anon:0 [ 670.880838] active_file:2590 inactive_file:2909 isolated_file:0 [ 670.880838] unevictable:0 dirty:171 writeback:0 unstable:0 [ 670.880838] slab_reclaimable:15588 slab_unreclaimable:113815 [ 670.880838] mapped:56797 shmem:397 pagetables:4540 bounce:0 [ 670.880838] free:901405 free_pcp:490 free_cma:0 [ 670.885407] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 670.885422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.885442] alloc_pages_current+0x107/0x210 [ 670.885469] ion_page_pool_alloc+0x17f/0x270 [ 670.890701] Node 0 active_anon:1324128kB inactive_anon:832kB active_file:9440kB inactive_file:10464kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:225748kB dirty:676kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 589824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 670.896122] ion_system_heap_allocate+0x154/0xa90 [ 670.896146] ? ion_system_heap_free+0x250/0x250 [ 670.896191] ? ion_alloc+0x306/0x900 [ 670.932745] Node 0 DMA free:10456kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 670.935592] ion_alloc+0x29b/0x900 [ 670.935616] ? ion_dma_buf_release+0x50/0x50 [ 670.935640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 20:09:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xf, 0x4, 0xfe) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x7fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) ioctl$SIOCNRDECOBS(r1, 0x89e2) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x4a802, 0x0) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8000, 0x100) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcsa\x00', 0x40, 0x0) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000004c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r6, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xdc, r7, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'dummy0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, [], 0x22}}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:apt_var_cache_t:s0\x00'}]}, 0xdc}, 0x1, 0x0, 0x0, 0x40}, 0x48889) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000006c0)={0x8, 0x5, 0x4, 0x1000000, 0x1, {0x77359400}, {0x2, 0xc, 0x20, 0x7, 0x2, 0x0, "9651f856"}, 0x9, 0x3, @offset=0xfffffffd, 0x3f, 0x0, 0xffffffffffffffff}) write$FUSE_DIRENT(r9, &(0x7f0000000040)=ANY=[@ANYBLOB="10000001196d944a6ed3790000000000"], 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$inet_udp(0x2, 0x2, 0x0) close(r12) splice(r10, 0x0, r12, 0x0, 0x80000001, 0x0) ioctl$GIO_CMAP(r10, 0x4b70, &(0x7f0000000200)) write$P9_RATTACH(r8, &(0x7f00000001c0)={0x14, 0x69, 0x2, {0x1, 0x2, 0x2}}, 0x14) r13 = syz_open_dev$audion(&(0x7f0000000680)='/dev/audio#\x00', 0x7f2, 0x2d0780) renameat(r4, &(0x7f0000000080)='./file0\x00', r13, &(0x7f0000000440)='./file0\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/../file0\x00', 0x11, 0x1) r14 = socket$nl_generic(0x10, 0x3, 0x10) r15 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r14, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r15, 0x5}, 0x1c}}, 0x0) r16 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r17 = socket$nl_generic(0x10, 0x3, 0x10) r18 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r17, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r18, 0x5}, 0x1c}}, 0x0) r19 = socket$nl_generic(0x10, 0x3, 0x10) r20 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r19, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r20, 0x5}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r16, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r20, 0x5, 0x70bd26}, 0x1c}}, 0x0) r21 = socket$nl_generic(0x10, 0x3, 0x10) r22 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r21, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r22, 0x5}, 0x1c}}, 0x0) write$binfmt_script(r5, &(0x7f0000000980)=ANY=[@ANYRES32=r11, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESOCT=0x0, @ANYRES32=r7, @ANYPTR64, @ANYPTR64=&(0x7f0000000840)=ANY=[@ANYRES16, @ANYPTR64, @ANYBLOB="0e5c961904dc12759d5a5a977d5425ca7783a730346c74761d014e49f91faaefe32c888db19b44dc33c34ec5565da4e9b4", @ANYBLOB="9d809063d132b55fd8f40d5b9ddc8444edc25f6152d9a0992509e0be4fe9f4a305a1d0f7cfe36eeb8a3d57962a5af64c6e1323c9df4d83cc569d8bec4db95b9f0d2f9ca0b460dd3f8dc1969f7de5577f287777b43178f6ff8465439564982f8dd2aeff22b5168b1bc09585402498c08ef97239e52842975756d74748ff34f3294b6ff3b9416b75d97444f75e6f43de3bed93e85e19cb3fa806a8c1a454e9aafff05270a2bd3ed1b188b261e00df69b0216d1473d08b03b5e5c", @ANYPTR64, @ANYRES32, @ANYRES16=r16, @ANYRESHEX], @ANYRESOCT], @ANYBLOB="7bfc68ac82facb348cc759bb518227e798ffd988c79dcf4e47687dacbb38d95d769d582122f59c774a807998fa6f308172d33ffda34b8abb4bd5f2cfb15f343b78a077b59a7c33530f635408847aa3b7b56dbfe8311546a34a46ae1bb6ebb7d1b938249c51b6607eb0c240230bba5853005204c55cb9f800d9fc8f0dfc511165268db0680d5fad7ffdee50138cebd92e7a43279ad492396354d89e6bab9dd176c5938141f613825ef9edaaa7551bf7dc86d7c65f50b8e8d0a14516f72f0956937967d3a696c83912eb868ffb77d5157e6a5570bd7de74dd96a1902d7ec9fce636a973ea00686a1734a373efc441e8b207b09136cf4ba7e129f4aace499b7d5e081dadf7e259107151fddf818257d231ff07e6633d952022517527faf2f5807b5581fb8ee884dac93a267e993c435b7a79b29dda782b4d95ec3ca893d9491131bba84efd023147fd84f8ed073a8f9c683ffd1529ea0b67b6636e613f91e1217983228ee1808c99b7d957a6bbfab53a9390794871080417474cd85c0e2418d69b5323aa0bf9d5d0f75b30b838820b8431bbf40398f8241b2dcd751b8664c6aa42b49b35c844797bfb26706bb807a55d50157e143d6641b7a7a931b9228c542667f5e873d4fda1fa8399cc334522e76c40f1445e89916f73118cf6072aa1ae75dc241c9441af1fbe413f77f23f70246558b9bb26a9e9208a3e8478d4881292d3c310feafab358dc658178dc52eefa80aeac84cd2a1719ff567a2d5184c13dfabe25e152ebd327ee6cfaa8ce50a4db9c595713ddac5808774229fd9091fb128b8edfd9f3b6d6cfa3d3125d79b2812e0181459b7612886bdc9cfe4a46c957094b63427f677dd4996beb082d8fa2657b45faaf980cb0b6b6d817e3e5122626f884b01fd65fb5aa061db8bef5461eba52720fdb887238430b28195a4ba6db34e854f3bbbb36f6d30cb594c13f2c593de0ef215999089b8d9a8d3b0af91522726c32278f397c7e948cc5992a3dd43e9ee21d9566d2634d9908d32081362bd131a340dbea9cc5aef6f8c4762f061f74ff95f315d806696318ad2b5f38eb95eacf94d3bc1b1e1df461b215669cd6f1349d9d2109c309d54a4b6c41ac07c78ed382f8501427135774c1e053114200bd4dfb975378287a510f69ba74c7d714aaa53d43a900c4ee527db2deaaea8c603b8cd5199eab0ae8ed5faa904eb5725c095e4b3904e202207bf5371972f1bcdc425eefd42d6b54c0e69a57279b91025aad3ed2bd83fb53ce50fb3903626bba4bcfa6eb5baf2c4b49b307385fdf7b7b887e84b24c658dc95f77425c588b0068e91c1a832eaed8f38d0ed4968a871ccaa853257750f78854818821a457360bd08465d5cdc5166b2e24c18cfed6003a67b0fdb7802b4bd3c7a07223ebf71749d48db9b4f1e9e65b9a2bd5553037aba04e80bf85c069391f5e8b62eeabb06ddec73fa61665256ad414fd62f3597c2c8ffab8681afae003a1684a4725246a147b48cbfbe002f8bc60286dfcf08ab8126be0a3736767e2f416baf1bf6c01659f87bf5738a1a78399359b7759f010bb81923119a8bcb60255d0bbf5e3a1b886f6cf2d4eaff859cce7b066d04b920e3670ec1f0e61049cea92534ca6acb9c146949639d1aa511a6f17db0f307aa803b0458c684adccab876ea8e063eff89d6db32f2d9f53b00b3b4ceab28407200ad38f48a4bafb27423cf92f1575a0be36e02758f4a5a4ab8a1bd4aa62161323ed77c6f19f1e3ab8cce527536418dd96c931b8ebf2faeceb709f23b265c3ad9b62f131171957a68ed9c46dda217d121a961e6cc6cdf7ad9fc66b08b93b86727f08838eb77d8dc621983974cfa0e907bf67f1e1656cdcff706fc18756973cb98e12df88a96b1749c2d8342d4a7fdee1bf2e94e2f4171001773fc5bf8cc1c2355d7192cc5d872554208367a3fb454b96bbaa325211e69234e4659d70c18d9913f2e0df933fe97bb2231f1aae00ec3bd450d736148b3eddc5b5d9cf063bbcd9eb61674360e6babe376e795c36fdbc961ae2d86ad9bd2eca4d7b1e35721f577f39eaa1a2591a54fe3548739b796d0cca335aa191f29b1668e0da248513ae6b23df5630a0a9378e9f7981d7625b89d75715c6b423ae82a65c08996e87d7fc17ff59412cb73970a48ad3281046f7f0486d47c350eba14795bb195ec1b4b1fd03025a5b833e8029715339f514d5d38e0154088cc48bf44bcfc3db230de99027b1ecf1d79cd80587d07ca86773248eb3d0ae6ef83d845415e236a298e16699d6fd2d3434b2a94ef7dc13085d8dd367a57587f120087870a8c18196ca72da14f53b1b6acc437cfb51cd6d23d48265c78746320b6649821747bc9929b242aae0b097cbfaecfc585cd29566143c24090061dad8c0ab77b13bdcdc2e4851e6b2ef90b522352bfe80840cdeb95608db43927ddea5a94573011f4bef3fedcad532168fca1183644e18a0c48bfc892aa8cdba4878d5ff7b7a99ea0cc499449b38c8d00c7cef01a601c88c65174418a420cd20c85007e7f6beefe6571ff83ade635d21ba845f9d42a6e03445f280d25b9bcad3d762b3b0913bba8784cf15feb410e97045942477e6048b7d9359fa7ca808354cf4408f83cb0955b40872bd58290696d6e4877e39c1e97e9b6d6d98c58c6d5f30bb540f47ca431f601cef79b2dec8869c932be7f6f9a3873fee2697a32ef3f7a9b5de42dad2ce24d2582ebcdd83a609cc5ec40fb01e45c23b826ef66c01f66fe5508f797b2971ef5c73e296ed4401d385d2341026424e440eb302304edbc99aae34dc4bdddf5e50a26a9f03adcba65c051006e2988a250630f8b7a162fcd5834302bb9e625a9a62a3dfa241a252e9bef97712543756bedb70a4cb0c07cde76fc68ca297d1da10db75ab2f54cf36d992ec784799f289a907fa3b454540ae79ecba3e74b7aa3ee4a97b4abed36b06e0af794efb4209e131d4e2061448a7d6266c73579cb9eb3c09a31e13ef5293eb2fe02154f399d0a07232c6688355e5686ffe872f51cf419aad9ab6312886f797411f4c43bdbe6adb08d348e160197ec7b49c14ade72474bb7597d2ffb201bab118941f5b92d01a77aad3acb2c4d72440b824cdad0d22f7fda299e82dc9018f4d688046d28db3be2dd2c0d72886faf46b2769890b5a35402ebabefcc044a8fac1a5de8fe9503708215c49a26fd7c2e820317dd34b520258e21c4c5dfd91e163a597b633daceb67b6eb2f7353945b68dd65bfa20d44fe30fbf07eab85cd3135dee70d7007bbed7b3c06aa4e84464855daa7a6c10bb2de0ef659ab853e96b330015e0806c744ff82be857956e0747380e13c49ae7e224eabd847b2be1b6af68d3d09ef678e0469e6fecf496082567f7f6b4a850b8816cdb909f905899d650be3448b581a90b7eef11e87ae1d0b8c1fae2835224e6bef77e4fa685905818076edd9fb134e1a8c26f1a7946f33b2cfa2ea9c2e655886feb269b23cd6edc2f702cf02ad78f19452b36e4e16c3e0755c68e9decaca94baae1d58df14d42ddc6a249d9bcf1b3fca4f3512ee3b5eaad2357e7d7feb95f946e2c3b09d6462ea1d12ca5468e39fdcca75b12209ea457cebcf3fde35a158d16b35439effd5e0f6b27d0330a8fb9e1dc54f476354e0306adca9d21ef17792f1bdcc78cb702110d1f8758024103f67f8c17adc67b147bdbb11b9ade2fd5a923832812b252c64afb750058e99af7c2ce020a465c316c6ffbd0bcb2a726bb4065831b78187870c87a31377a372ed05794c8f02b5f6539a79a83df2ba16cae357fc02dc3192e0681f63c9f8c3cf1c322cb73e201015f718b67a66c50af34f3fc248c7e62bd9b242c55171a7f8e09c9a317ba7c09cbc70d6693c75f75559550296ebe6b146cd1927c227f2fdcbe15df0be8ed09594ca086c496244de021118e590651e3d9681ca48b88ea5f3512a8e082d8bb373e46a2a4a9f2e176a850f60ea2f7aad9ca530fc3289c8587ce834b5bea6c6f94770267c2be2537f212d49e21e932ed268a34a4effd0fd6e27397e394f609086c03dfbe035bc37ce74a30328271d9caee29f6a89750d9c9530cfe73c79bdd0e51ee8e1105cd8034bac6d6cfe6f1e3a251ed461b49572858a3d00085979240d131e33be8d315a0ce95bcd7d1a94c684ff6e11ac4ffe20b83ff122bc74d3e91e40025ff01759bf00d73d79a40c66e0abd98ccce85daad7d1e45d5248fd3ea6514d31cc2aa9fba247a8f027642b22a6ba917579a5b6765f06a280da9ae4ae1d27a2d5a26554c745cdb411acf316803f2a7d48798e326271cae2bbcbdb0c2b33abf1442f3e163a7b6b5d48ddee59f361b38965dc96a600376225193987bdd8dbc4cc600af347c012fe24c066c7ff80536074169f4f3a5059bfbda3bfc919fd5e5e7d087b9285adaaa233eda4b869ce49a6724971da5f4220d94a99c90be6c804e7115f04a855cef1f96cd50f0489954a280528bde7b6f0528a804edc16679c8ce48a6c822841e5004e2e5c5bf280eb6ae2da8ce9a4df9e0252826a80ddbc828d88fedbd5c2f30dba3271ecd32016070c1b9f6c278b55c710100566d628213947004f3e50e3af5d67e29d0ecfbefc0397d809cfb85436319fb5bf4b631569a46f35bc466bcc40301f9df95c97a57d3cab1f04d46883ce742a0ec677e1c92543377e4a8e5e71a6e9dcd88fedae1b1bcf74fb911d1ee180db8cec1355297a898a6e097325224d6c0f3dac597b728f8a54c4c275122e241a0ae704fcf0a2c4b7be0e23f508e1a8bc84b39d9dbfb5d8afa9637c9b148a46db3e3b4f96851732c19659fc1956b49c24ff713744cfa929f61642b183b79001dade974975540ac5c3305b4470764e39139943d2acae98be34facb5e4d2eb6d02811e26e7668da9542e07cf1a21787c9d99cd6d1c6266da804d91e3b6a9d455f3701aa4f6240d4109ad3d7f13a884d38e72dca5cbc73d2d49740736c1f23a0047821e3f21f9d1729372111aaf63c8d4686913e89118cc97ea930296ea3cdf3bbcb60e85f8e1c180b78675beb2263c580dd8e74014b3f1cee2f06ee100a1676bb1c7dbbc035e235ac5ac220c22c5e47c7dd232334dd3ab9559c2f44007eeccbd8c4cb16df2d3415573ea77c6697187883eb60d79c16a8e4b944f7e88c6c6f97130a2e4e9558689bc203e35455c0cb52a08057a9989874737026224ae361f6ec5a9c5c6196517e576602d1db0e128eaad8c1eddcbc0adc1b09451690d05b10c689896c5901766b77b1bc93584867c8c03c7ed2b4165c1a2044638b87ee3b14f1e70cf975206a8f32547009c0309b6f469a2e29fa162472455ea6e5fcdd1af77004293ab74bab988939712324fed9a14ce2ea7870114e7b909715a103eb36e0e06de489e3c0f3926a850037b828497990e6c986935a4b623d2e138482fa584aef1b47ee9e7a6822673d2776063d4f5bf92619836058cf05a032b0f19a2a91e5b37df97dd9e380414f23f90b640146eab90c09e3680f3bc5d99394e9c7803bff9c46f7166e9e13f8720afc7c75331acae03efde707de830784b69178dee672dfadd37b0c43bceec1eefcfb952cbe098444596ada09bb12c40de1bac693512140b2c5e2a9f1d9acada0d3c7533a86d83cb9820d3c0af6c12b43265b1f0ff45df10e9c7bba224a9b744de2dbbd88a145efb016e67d31baf013b9286bb3ba44e82b702078c573706b2f37088e01296c536830839e6d0c64f94457be343c82712c8f7275f3cde7e67a2910d3789192a603bea9b909bb5aaae6603b6f5f1f7222c68fd8", @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRESOCT=r22]], 0x1014) r23 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r24 = ioctl$KVM_CREATE_VM(r23, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r24, 0xae41, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r24, 0x4010ae74, &(0x7f0000000340)={0x5, 0x100, 0x7}) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x120, 0x0, 0x0) [ 670.941346] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 670.945594] ? _copy_from_user+0xdd/0x150 [ 670.945616] ion_ioctl+0x17b/0x329 [ 670.945633] ? ion_alloc.cold+0x28/0x28 [ 670.945654] ? __might_sleep+0x95/0x190 [ 670.950121] Node 0 DMA32 free:57168kB min:36168kB low:45208kB high:54248kB active_anon:1324128kB inactive_anon:832kB active_file:9468kB inactive_file:10568kB unevictable:0kB writepending:676kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12032kB pagetables:18160kB bounce:0kB free_pcp:1960kB local_pcp:712kB free_cma:0kB 20:09:44 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:44 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 670.978397] ? ion_alloc.cold+0x28/0x28 [ 670.978416] do_vfs_ioctl+0xd5f/0x1380 [ 670.978435] ? selinux_file_ioctl+0x46c/0x5d0 [ 670.978450] ? selinux_file_ioctl+0x125/0x5d0 [ 670.978464] ? ioctl_preallocate+0x210/0x210 [ 670.978484] ? selinux_file_mprotect+0x620/0x620 [ 670.983456] lowmem_reserve[]: 0 0 1 1 1 [ 670.987990] ? iterate_fd+0x360/0x360 [ 670.988007] ? nsecs_to_jiffies+0x30/0x30 [ 670.988029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.992220] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 671.018366] ? security_file_ioctl+0x8d/0xc0 [ 671.018386] ksys_ioctl+0xab/0xd0 [ 671.018403] __x64_sys_ioctl+0x73/0xb0 [ 671.018420] do_syscall_64+0xfd/0x620 [ 671.018442] entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:09:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xfffff000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 671.022137] lowmem_reserve[]: 0 0 0 0 0 [ 671.026377] RIP: 0033:0x45b399 [ 671.026394] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 671.026401] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 671.026415] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 671.026423] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 671.026430] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 671.026443] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 671.032157] Node 0 DMA: 3*4kB (UE) 4*8kB (UE) 7*16kB (U) 8*32kB (UE) 1*64kB (E) 4*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10460kB [ 671.037004] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:09:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xffffff7f}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 671.375207] Node 0 DMA32: 570*4kB (UME) 347*8kB (UME) 1259*16kB (UME) 822*32kB (UME) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 27*1024kB (U) 5*2048kB (UM) 0*4096kB = 90352kB 20:09:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x14) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 671.423640] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB 20:09:44 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 671.508182] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 671.541105] device veth1_macvtap entered promiscuous mode [ 671.557342] device macsec0 entered promiscuous mode [ 671.577530] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 671.597940] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 671.627158] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 671.663339] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 671.707199] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:09:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xffffff9e}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r1, 0x5}, 0x1c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r3, 0x5}, 0x1c}}, 0x0) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x1e, 0x4, 0x4) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x3}, 0x10) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r6, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r5, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 671.748110] 6457 total pagecache pages [ 671.752053] 0 pages in swap cache [ 671.782158] Swap cache stats: add 0, delete 0, find 0/0 [ 671.836696] Free swap = 0kB [ 671.865131] Total swap = 0kB [ 671.868315] 1965979 pages RAM [ 671.902759] device veth1_macvtap left promiscuous mode [ 671.910752] 0 pages HighMem/MovableOnly [ 671.923849] 341741 pages reserved [ 671.943127] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 671.954841] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 671.955161] 0 pages cma reserved [ 671.996817] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 672.001559] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 672.033454] CPU: 0 PID: 6349 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 672.041424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.050816] Call Trace: [ 672.053456] dump_stack+0x197/0x210 [ 672.057108] warn_alloc.cold+0x7b/0x173 [ 672.061121] ? zone_watermark_ok_safe+0x260/0x260 [ 672.065982] ? __lock_is_held+0xb6/0x140 [ 672.070083] __alloc_pages_slowpath+0x2214/0x2870 [ 672.076170] ? warn_alloc+0x110/0x110 [ 672.079973] ? __lock_is_held+0xb6/0x140 [ 672.084045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.089590] ? should_fail+0x14d/0x85c [ 672.093496] ? __isolate_free_page+0x4c0/0x4c0 [ 672.098183] ? __might_sleep+0x95/0x190 [ 672.102169] __alloc_pages_nodemask+0x617/0x750 [ 672.106848] ? __alloc_pages_slowpath+0x2870/0x2870 [ 672.111887] ? retint_kernel+0x2d/0x2d [ 672.116832] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.122393] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 672.128136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.133707] alloc_pages_current+0x107/0x210 [ 672.138570] ion_page_pool_alloc+0x17f/0x270 [ 672.142995] ion_system_heap_allocate+0x154/0xa90 [ 672.147859] ? ion_system_heap_free+0x250/0x250 [ 672.152545] ? ion_alloc+0x306/0x900 [ 672.156270] ion_alloc+0x29b/0x900 [ 672.159826] ? ion_dma_buf_release+0x50/0x50 [ 672.164369] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.170448] ? _copy_from_user+0xdd/0x150 [ 672.174620] ion_ioctl+0x17b/0x329 [ 672.178175] ? ion_alloc.cold+0x28/0x28 [ 672.182169] ? __might_sleep+0x95/0x190 [ 672.186158] ? ion_alloc.cold+0x28/0x28 [ 672.190143] do_vfs_ioctl+0xd5f/0x1380 20:09:45 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 672.194043] ? selinux_file_ioctl+0x46c/0x5d0 [ 672.198549] ? selinux_file_ioctl+0x125/0x5d0 [ 672.203058] ? ioctl_preallocate+0x210/0x210 [ 672.207499] ? selinux_file_mprotect+0x620/0x620 [ 672.212314] ? iterate_fd+0x360/0x360 [ 672.216139] ? nsecs_to_jiffies+0x30/0x30 [ 672.220309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.225867] ? security_file_ioctl+0x8d/0xc0 [ 672.230298] ksys_ioctl+0xab/0xd0 [ 672.233771] __x64_sys_ioctl+0x73/0xb0 [ 672.237669] do_syscall_64+0xfd/0x620 [ 672.241480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.246670] RIP: 0033:0x45b399 [ 672.249953] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.268859] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 672.276573] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 672.284114] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 672.291479] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 672.298846] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 672.306218] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 672.316413] warn_alloc_show_mem: 2 callbacks suppressed [ 672.316418] Mem-Info: [ 672.326027] active_anon:331085 inactive_anon:208 isolated_anon:0 [ 672.326027] active_file:1968 inactive_file:1987 isolated_file:12 [ 672.326027] unevictable:0 dirty:171 writeback:0 unstable:0 [ 672.326027] slab_reclaimable:15574 slab_unreclaimable:114391 [ 672.326027] mapped:55273 shmem:397 pagetables:4605 bounce:0 [ 672.326027] free:901482 free_pcp:513 free_cma:0 [ 672.326715] CPU: 1 PID: 6335 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 672.368601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.374783] Node 0 active_anon:1324340kB inactive_anon:832kB active_file:6952kB inactive_file:6776kB unevictable:0kB isolated(anon):0kB isolated(file):48kB mapped:219652kB dirty:676kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 595968kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 672.377961] Call Trace: [ 672.377985] dump_stack+0x197/0x210 [ 672.378008] warn_alloc.cold+0x7b/0x173 [ 672.378027] ? zone_watermark_ok_safe+0x260/0x260 [ 672.378044] ? compaction_deferred+0x16a/0x3b0 [ 672.378063] ? try_to_compact_pages+0x44/0xae0 [ 672.378093] __alloc_pages_slowpath+0x2214/0x2870 [ 672.414776] Node 0 DMA free:10452kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 672.416498] ? warn_alloc+0x110/0x110 [ 672.416515] ? __lock_is_held+0xb6/0x140 [ 672.416535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.416553] ? should_fail+0x14d/0x85c [ 672.416574] ? __isolate_free_page+0x4c0/0x4c0 [ 672.416601] ? __might_sleep+0x95/0x190 [ 672.422375] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 672.426040] __alloc_pages_nodemask+0x617/0x750 [ 672.426063] ? __alloc_pages_slowpath+0x2870/0x2870 [ 672.426087] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.426105] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 672.426121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.426141] alloc_pages_current+0x107/0x210 [ 672.426165] ion_page_pool_alloc+0x17f/0x270 [ 672.426183] ion_system_heap_allocate+0x154/0xa90 [ 672.426205] ? ion_system_heap_free+0x250/0x250 [ 672.431616] Node 0 DMA32 free:56592kB min:36168kB low:45208kB high:54248kB active_anon:1324140kB inactive_anon:832kB active_file:7348kB inactive_file:6788kB unevictable:0kB writepending:676kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12256kB pagetables:18420kB bounce:0kB free_pcp:1888kB local_pcp:596kB free_cma:0kB [ 672.435621] ? ion_alloc+0x306/0x900 [ 672.435642] ion_alloc+0x29b/0x900 [ 672.435664] ? ion_dma_buf_release+0x50/0x50 [ 672.435686] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.435701] ? _copy_from_user+0xdd/0x150 [ 672.435720] ion_ioctl+0x17b/0x329 [ 672.435738] ? ion_alloc.cold+0x28/0x28 [ 672.435763] ? __might_sleep+0x95/0x190 [ 672.435785] ? ion_alloc.cold+0x28/0x28 [ 672.469151] lowmem_reserve[]: 0 0 1 1 1 [ 672.470717] do_vfs_ioctl+0xd5f/0x1380 [ 672.470738] ? selinux_file_ioctl+0x46c/0x5d0 [ 672.470755] ? selinux_file_ioctl+0x125/0x5d0 [ 672.470772] ? ioctl_preallocate+0x210/0x210 [ 672.470789] ? selinux_file_mprotect+0x620/0x620 [ 672.470813] ? iterate_fd+0x360/0x360 [ 672.470832] ? nsecs_to_jiffies+0x30/0x30 [ 672.470860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.495551] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 672.499204] ? security_file_ioctl+0x8d/0xc0 [ 672.499222] ksys_ioctl+0xab/0xd0 [ 672.499240] __x64_sys_ioctl+0x73/0xb0 [ 672.513454] lowmem_reserve[]: 0 0 0 0 0 [ 672.515494] do_syscall_64+0xfd/0x620 [ 672.515520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.521140] Node 0 DMA: 3*4kB (UE) 5*8kB (UE) 8*16kB (U) 9*32kB (UE) 6*64kB (UE) 9*128kB (UE) 5*256kB (UE) 4*512kB (UE) 1*1024kB (E) 2*2048kB (ME) 0*4096kB = 10452kB [ 672.525436] RIP: 0033:0x45b399 [ 672.525453] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.525460] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 672.525474] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 672.525483] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 672.525492] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 672.525499] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 672.525511] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 672.530014] Node 0 DMA32: 1821*4kB (UME) 415*8kB (UME) 1208*16kB (UME) 828*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 56428kB [ 672.744699] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 672.746784] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 672.802316] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 672.808523] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 672.834465] CPU: 0 PID: 6364 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 672.842286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.851651] Call Trace: [ 672.854261] dump_stack+0x197/0x210 [ 672.857908] warn_alloc.cold+0x7b/0x173 [ 672.861907] ? zone_watermark_ok_safe+0x260/0x260 [ 672.866781] ? __lock_is_held+0xb6/0x140 [ 672.870885] __alloc_pages_slowpath+0x2214/0x2870 [ 672.875771] ? warn_alloc+0x110/0x110 [ 672.879583] ? __lock_is_held+0xb6/0x140 [ 672.883659] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.889217] ? should_fail+0x14d/0x85c [ 672.893123] ? __isolate_free_page+0x4c0/0x4c0 [ 672.897730] ? __might_sleep+0x95/0x190 [ 672.901724] __alloc_pages_nodemask+0x617/0x750 [ 672.906416] ? __alloc_pages_slowpath+0x2870/0x2870 [ 672.911454] ? fs_reclaim_acquire+0x20/0x20 [ 672.915790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.921357] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 672.927093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.932658] alloc_pages_current+0x107/0x210 [ 672.937101] ion_page_pool_alloc+0x17f/0x270 [ 672.941533] ion_system_heap_allocate+0x154/0xa90 [ 672.946402] ? ion_system_heap_free+0x250/0x250 [ 672.951092] ? ion_alloc+0x306/0x900 [ 672.954832] ion_alloc+0x29b/0x900 [ 672.958532] ? ion_dma_buf_release+0x50/0x50 [ 672.962992] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.968564] ? _copy_from_user+0xdd/0x150 [ 672.972757] ion_ioctl+0x17b/0x329 [ 672.976333] ? ion_alloc.cold+0x28/0x28 [ 672.980336] ? __might_sleep+0x95/0x190 [ 672.984336] ? ion_alloc.cold+0x28/0x28 [ 672.988332] do_vfs_ioctl+0xd5f/0x1380 [ 672.992243] ? selinux_file_ioctl+0x46c/0x5d0 [ 672.996763] ? selinux_file_ioctl+0x125/0x5d0 [ 673.001279] ? ioctl_preallocate+0x210/0x210 [ 673.005705] ? selinux_file_mprotect+0x620/0x620 [ 673.010486] ? iterate_fd+0x360/0x360 [ 673.014302] ? nsecs_to_jiffies+0x30/0x30 [ 673.018472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.024056] ? security_file_ioctl+0x8d/0xc0 [ 673.028480] ksys_ioctl+0xab/0xd0 [ 673.031943] __x64_sys_ioctl+0x73/0xb0 [ 673.035847] do_syscall_64+0xfd/0x620 [ 673.039675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.044879] RIP: 0033:0x45b399 [ 673.048085] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 673.067009] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 673.074714] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 673.081975] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 673.089272] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 673.096568] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 673.103844] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 673.169126] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:09:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xffffffc3}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup2(0xffffffffffffffff, r4) sendto$unix(r6, &(0x7f0000000340)="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", 0x1000, 0x200048c0, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000040)) [ 673.213877] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 673.288713] device veth1_macvtap entered promiscuous mode [ 673.291774] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 673.324011] 4985 total pagecache pages [ 673.337075] 0 pages in swap cache [ 673.347799] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 673.347971] Swap cache stats: add 0, delete 0, find 0/0 [ 673.359437] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 673.375580] Free swap = 0kB [ 673.383295] Total swap = 0kB [ 673.393724] 1965979 pages RAM [ 673.395291] warn_alloc_show_mem: 1 callbacks suppressed [ 673.395295] Mem-Info: [ 673.402480] 0 pages HighMem/MovableOnly [ 673.414844] 341741 pages reserved [ 673.418647] active_anon:331053 inactive_anon:206 isolated_anon:12 [ 673.418647] active_file:2323 inactive_file:2262 isolated_file:13 [ 673.418647] unevictable:0 dirty:46 writeback:20 unstable:0 [ 673.418647] slab_reclaimable:15576 slab_unreclaimable:114331 20:09:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xfffffff0}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000040)={0x6, 0x5, 0x20}) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 673.418647] mapped:55685 shmem:397 pagetables:4620 bounce:0 [ 673.418647] free:900967 free_pcp:356 free_cma:0 [ 673.424084] 0 pages cma reserved [ 673.507349] Node 0 active_anon:1324112kB inactive_anon:824kB active_file:8408kB inactive_file:7876kB unevictable:0kB isolated(anon):48kB isolated(file):52kB mapped:221300kB dirty:176kB writeback:80kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 589824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 20:09:46 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 673.563671] device veth1_macvtap left promiscuous mode 20:09:46 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 673.722514] Node 0 DMA free:14548kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 673.780948] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 673.790280] Node 0 DMA32 free:122648kB min:36168kB low:45208kB high:54248kB active_anon:1326268kB inactive_anon:824kB active_file:8584kB inactive_file:7876kB unevictable:0kB writepending:288kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12288kB pagetables:18516kB bounce:0kB free_pcp:2112kB local_pcp:1384kB free_cma:0kB [ 674.086155] lowmem_reserve[]: 0 0 1 1 1 [ 674.090448] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 674.157682] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 674.158923] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 674.186041] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 674.216506] CPU: 1 PID: 6387 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 674.224356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.227192] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 674.233722] Call Trace: [ 674.233756] dump_stack+0x197/0x210 [ 674.233781] warn_alloc.cold+0x7b/0x173 [ 674.233797] ? zone_watermark_ok_safe+0x260/0x260 [ 674.233814] ? __lock_is_held+0xb6/0x140 [ 674.233849] __alloc_pages_slowpath+0x2214/0x2870 [ 674.233956] ? warn_alloc+0x110/0x110 [ 674.267224] ? __lock_is_held+0xb6/0x140 [ 674.271305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.276864] ? should_fail+0x14d/0x85c [ 674.280774] ? __isolate_free_page+0x4c0/0x4c0 [ 674.285389] ? __might_sleep+0x95/0x190 [ 674.289397] __alloc_pages_nodemask+0x617/0x750 [ 674.292721] lowmem_reserve[]: 0 0 0 0 0 [ 674.294095] ? __alloc_pages_slowpath+0x2870/0x2870 [ 674.294122] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.294146] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 674.302745] Node 0 DMA: 3*4kB (UE) 5*8kB (UE) 8*16kB (U) 9*32kB (UE) 6*64kB (UE) 9*128kB (UE) 5*256kB (UE) 4*512kB (UE) 1*1024kB (E) 2*2048kB (ME) 0*4096kB = 10452kB [ 674.303141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.330291] Node 0 DMA32: 955*4kB (UE) 724*8kB (UE) 1170*16kB (UME) 841*32kB (UME) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 55308kB [ 674.334846] alloc_pages_current+0x107/0x210 [ 674.334871] ion_page_pool_alloc+0x17f/0x270 [ 674.334890] ion_system_heap_allocate+0x154/0xa90 [ 674.334911] ? ion_system_heap_free+0x250/0x250 [ 674.334934] ? ion_alloc+0x306/0x900 [ 674.370973] ion_alloc+0x29b/0x900 [ 674.374561] ? ion_dma_buf_release+0x50/0x50 [ 674.379030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.384605] ? _copy_from_user+0xdd/0x150 [ 674.388777] ion_ioctl+0x17b/0x329 [ 674.392342] ? ion_alloc.cold+0x28/0x28 [ 674.397300] ? __might_sleep+0x95/0x190 [ 674.399690] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 674.401293] ? ion_alloc.cold+0x28/0x28 [ 674.401313] do_vfs_ioctl+0xd5f/0x1380 [ 674.401331] ? selinux_file_ioctl+0x46c/0x5d0 [ 674.401349] ? selinux_file_ioctl+0x125/0x5d0 [ 674.428913] ? ioctl_preallocate+0x210/0x210 [ 674.433359] ? selinux_file_mprotect+0x620/0x620 [ 674.438148] ? iterate_fd+0x360/0x360 [ 674.441977] ? nsecs_to_jiffies+0x30/0x30 [ 674.446153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.451717] ? security_file_ioctl+0x8d/0xc0 [ 674.456155] ksys_ioctl+0xab/0xd0 [ 674.459632] __x64_sys_ioctl+0x73/0xb0 [ 674.463538] do_syscall_64+0xfd/0x620 20:09:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket$inet6(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) ptrace(0x10, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0xb}, 0x8000000200036158, 0x800027b}, r1, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x240400, 0x0) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180)='wireguard\x00') r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="b3a42107a30e558685d38d47435a8125ca76f9a28d995b7f64994c2cc2e6e7a93ceaa33513ea635a7edd016bf3bcec68a1d6dea7a6426c3c67dd6bf1c5cfc308f7e5b874650d85afca1dfb3001aa5d9015cc8205c0e12f105668475244c3306805686046495600f8e12a91f6ae4b4f6bd3796ae8970569c6c534474f134209279d2d0da82318d6a247f2fc03784124535486125655a6ae0749b81fd4e751dd98cc2771fddba12a51a2d2d0d08e834f94b687a73a6f0837e9fd0f9a0913943a34846390975c54947cb310a0cdfa84613ffc8fad3c8d0ad4", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="00ff000800000000000010", @ANYRES32=r10, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca1bb372eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271c4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x74}}, 0x0) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000840)={0x39c, r6, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r10}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x334, 0x8, 0x0, 0x1, [{0x330, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c0, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x1f}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @remote}}, {0x5, 0x3, 0x2b}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1b}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x34}}, {0x5, 0x3, 0x14}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x20}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3f}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0xe}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x14}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0xfffffffc}, {0x5, 0x3, 0xa}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x46}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5, 0x3, 0xa}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2a}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1c}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x1f}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x7a}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x77}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1f}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5, 0x3, 0x58}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x12}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1c}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr="2d886bbaed722ba12b8fbcca5d15ab3c"}, {0x5, 0x3, 0x60}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x401, @ipv4={[], [], @local}, 0x1ff}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @multicast2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x0, @empty, 0x47fe}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x100}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x39c}, 0x1, 0x0, 0x0, 0x8080}, 0x48045) [ 674.467366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.472578] RIP: 0033:0x45b399 [ 674.475786] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 674.477064] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 674.494706] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:09:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xfffffffc}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 674.494722] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 674.494729] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 674.494736] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 674.494745] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 674.494754] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 674.526583] Mem-Info: [ 674.526620] active_anon:331567 inactive_anon:206 isolated_anon:12 [ 674.526620] active_file:2273 inactive_file:2534 isolated_file:0 [ 674.526620] unevictable:0 dirty:74 writeback:0 unstable:0 [ 674.526620] slab_reclaimable:15555 slab_unreclaimable:114390 [ 674.526620] mapped:55828 shmem:397 pagetables:4629 bounce:0 [ 674.526620] free:900897 free_pcp:305 free_cma:0 [ 674.526654] Node 0 active_anon:1326268kB inactive_anon:824kB active_file:8208kB inactive_file:8964kB unevictable:0kB isolated(anon):48kB isolated(file):0kB mapped:221872kB dirty:288kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 674.550139] CPU: 0 PID: 6391 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 674.621235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.627352] Node 0 DMA free:10452kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 674.630605] Call Trace: [ 674.630630] dump_stack+0x197/0x210 [ 674.630653] warn_alloc.cold+0x7b/0x173 [ 674.630674] ? zone_watermark_ok_safe+0x260/0x260 [ 674.667080] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 674.671912] ? __lock_is_held+0xb6/0x140 [ 674.671954] __alloc_pages_slowpath+0x2214/0x2870 [ 674.671987] ? warn_alloc+0x110/0x110 [ 674.681857] Node 0 DMA32 free:53488kB min:36168kB low:45208kB high:54248kB active_anon:1326308kB inactive_anon:820kB active_file:8504kB inactive_file:9180kB unevictable:0kB writepending:300kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12160kB pagetables:18132kB bounce:0kB free_pcp:1492kB local_pcp:1308kB free_cma:0kB [ 674.685914] ? __lock_is_held+0xb6/0x140 [ 674.685935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.685950] ? should_fail+0x14d/0x85c [ 674.685970] ? __isolate_free_page+0x4c0/0x4c0 [ 674.685991] ? __might_sleep+0x95/0x190 [ 674.686010] __alloc_pages_nodemask+0x617/0x750 [ 674.686033] ? __alloc_pages_slowpath+0x2870/0x2870 [ 674.686053] ? fs_reclaim_acquire+0x20/0x20 [ 674.686068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.686089] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 674.691385] lowmem_reserve[]: 0 0 1 1 1 [ 674.719662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.719683] alloc_pages_current+0x107/0x210 [ 674.719705] ion_page_pool_alloc+0x17f/0x270 [ 674.719723] ion_system_heap_allocate+0x154/0xa90 [ 674.719746] ? ion_system_heap_free+0x250/0x250 [ 674.719764] ? ion_alloc+0x306/0x900 [ 674.719783] ion_alloc+0x29b/0x900 [ 674.719805] ? ion_dma_buf_release+0x50/0x50 [ 674.719829] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.719844] ? _copy_from_user+0xdd/0x150 20:09:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f00000001c0)=0xff, &(0x7f0000000200)=0x2) futex(&(0x7f0000000040)=0x1, 0x8b, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000100), 0x2ec) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r1, 0xc01c64ad, &(0x7f0000000180)={0x56, 0x2, 0x0, 0x8, 0xf02800, 0x6, 0x4}) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) [ 674.719861] ion_ioctl+0x17b/0x329 [ 674.719879] ? ion_alloc.cold+0x28/0x28 [ 674.719899] ? __might_sleep+0x95/0x190 [ 674.719914] ? ion_alloc.cold+0x28/0x28 [ 674.719930] do_vfs_ioctl+0xd5f/0x1380 [ 674.719945] ? selinux_file_ioctl+0x46c/0x5d0 [ 674.719965] ? selinux_file_ioctl+0x125/0x5d0 [ 674.757997] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 674.761749] ? ioctl_preallocate+0x210/0x210 [ 674.761771] ? selinux_file_mprotect+0x620/0x620 [ 674.761794] ? iterate_fd+0x360/0x360 [ 674.761815] ? nsecs_to_jiffies+0x30/0x30 [ 674.771685] lowmem_reserve[]: 0 0 0 0 0 [ 674.777047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.777066] ? security_file_ioctl+0x8d/0xc0 [ 674.777086] ksys_ioctl+0xab/0xd0 [ 674.777107] __x64_sys_ioctl+0x73/0xb0 [ 674.777125] do_syscall_64+0xfd/0x620 20:09:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xfffffffe}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 674.777146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.777158] RIP: 0033:0x45b399 [ 674.777173] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 674.777180] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 674.787657] Node 0 DMA: 2*4kB (U) 5*8kB (UE) 9*16kB (UE) 9*32kB (UE) 6*64kB (UE) 9*128kB (UE) 5*256kB (UE) 4*512kB (UE) 1*1024kB (E) 2*2048kB (ME) 0*4096kB = 10464kB [ 674.790852] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 674.790862] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 674.790872] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 674.790881] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 674.790891] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 674.796008] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 674.801597] Node 0 DMA32: 670*4kB (U) 647*8kB (UE) 1164*16kB (UE) 832*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 53104kB [ 674.810455] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 674.815288] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 674.818417] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 674.833263] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 674.840963] 5273 total pagecache pages [ 674.843746] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 674.847554] 0 pages in swap cache [ 674.876523] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 674.885537] Swap cache stats: add 0, delete 0, find 0/0 [ 674.901069] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 674.907395] Free swap = 0kB [ 674.918731] 5273 total pagecache pages [ 674.923139] Total swap = 0kB [ 674.929544] 0 pages in swap cache [ 674.951505] 1965979 pages RAM [ 674.979886] Swap cache stats: add 0, delete 0, find 0/0 [ 674.988335] 0 pages HighMem/MovableOnly [ 675.000143] Free swap = 0kB [ 675.005781] 341741 pages reserved [ 675.056148] Total swap = 0kB [ 675.059050] 0 pages cma reserved [ 675.080074] 1965979 pages RAM [ 675.165917] 0 pages HighMem/MovableOnly [ 675.170422] 341741 pages reserved [ 675.175000] 0 pages cma reserved 20:09:48 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:48 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r5 = socket$phonet_pipe(0x23, 0x5, 0x2) r6 = dup3(r5, r3, 0x0) write$char_usb(r4, &(0x7f0000000180)="dfa0da90c3f6bf8914dd7f00dedc63d146ac217f7b9873cca8227c9a0192422dca818eb93ceeb253921a4a00bdbb9fcb708f4be8fa91a13ebc68d3e2e57ade729c2e55af7787d7a8e6e1767204d7ed61ae0bffa6127d161e7cab9a0a51d124acaeffc5b65f41d8e7e1e2ea67cd5099ed87daf4d10b14edec941f9a0285c69c27337ef1bb26c593687fbd003a16ece960ca906ad2e76d597f3b", 0x99) recvfrom$unix(r2, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) r7 = fcntl$dupfd(r6, 0x0, r4) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000002140)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000002240)=0xe8) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r10, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r11, 0x5}, 0x1c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f0000002780)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000027c0)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r7, &(0x7f0000004940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000004900)={&(0x7f0000002800)={0x90, r8, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x24000014}, 0xd243b46111348bb6) 20:09:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0xffffffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:48 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 675.306848] device veth1_macvtap entered promiscuous mode 20:09:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) r7 = socket$isdn_base(0x22, 0x3, 0x0) getsockname(r7, &(0x7f00000000c0)=@sco, &(0x7f0000000180)=0x80) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 675.368823] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready 20:09:48 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r0 = socket(0x2, 0x1000000000000002, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) sendfile(r0, r1, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 675.428502] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 20:09:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x2}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x3}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 675.943540] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 675.959710] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 675.995829] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 676.025303] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 676.066148] CPU: 0 PID: 6524 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 676.066331] device veth1_macvtap left promiscuous mode [ 676.074005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.074010] Call Trace: [ 676.074036] dump_stack+0x197/0x210 [ 676.074061] warn_alloc.cold+0x7b/0x173 [ 676.074077] ? zone_watermark_ok_safe+0x260/0x260 [ 676.074092] ? __lock_is_held+0xb6/0x140 [ 676.074134] __alloc_pages_slowpath+0x2214/0x2870 [ 676.079819] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 676.089164] ? warn_alloc+0x110/0x110 [ 676.089183] ? __lock_is_held+0xb6/0x140 [ 676.089202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.089217] ? should_fail+0x14d/0x85c [ 676.089235] ? __isolate_free_page+0x4c0/0x4c0 [ 676.089255] ? __might_sleep+0x95/0x190 [ 676.089281] __alloc_pages_nodemask+0x617/0x750 [ 676.095840] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 676.096059] ? lockdep_hardirqs_on+0x415/0x5d0 [ 676.159703] ? __alloc_pages_slowpath+0x2870/0x2870 [ 676.164748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.170303] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 676.176028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.181601] alloc_pages_current+0x107/0x210 [ 676.186044] ion_page_pool_alloc+0x17f/0x270 [ 676.190487] ion_system_heap_allocate+0x154/0xa90 [ 676.195368] ? ion_system_heap_free+0x250/0x250 [ 676.200071] ? ion_alloc+0x306/0x900 [ 676.203821] ion_alloc+0x29b/0x900 [ 676.207395] ? ion_dma_buf_release+0x50/0x50 [ 676.211861] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.217426] ? _copy_from_user+0xdd/0x150 [ 676.221594] ion_ioctl+0x17b/0x329 [ 676.225162] ? ion_alloc.cold+0x28/0x28 [ 676.229165] ? __might_sleep+0x95/0x190 [ 676.233180] ? ion_alloc.cold+0x28/0x28 [ 676.237180] do_vfs_ioctl+0xd5f/0x1380 [ 676.241103] ? selinux_file_ioctl+0x46c/0x5d0 [ 676.245619] ? selinux_file_ioctl+0x125/0x5d0 [ 676.250133] ? ioctl_preallocate+0x210/0x210 [ 676.254592] ? selinux_file_mprotect+0x620/0x620 [ 676.259386] ? iterate_fd+0x360/0x360 [ 676.263219] ? nsecs_to_jiffies+0x30/0x30 [ 676.267402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.272970] ? security_file_ioctl+0x8d/0xc0 [ 676.277421] ksys_ioctl+0xab/0xd0 [ 676.280906] __x64_sys_ioctl+0x73/0xb0 [ 676.284908] do_syscall_64+0xfd/0x620 [ 676.288736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.293940] RIP: 0033:0x45b399 [ 676.297161] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 676.316081] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 676.323825] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 676.331224] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 676.338525] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 676.345812] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 676.353219] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 676.360638] CPU: 1 PID: 6534 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 676.368463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.377836] Call Trace: [ 676.380587] dump_stack+0x197/0x210 [ 676.384253] warn_alloc.cold+0x7b/0x173 [ 676.388255] ? zone_watermark_ok_safe+0x260/0x260 [ 676.393123] ? compaction_deferred+0x16a/0x3b0 [ 676.397731] ? try_to_compact_pages+0x44/0xae0 [ 676.402357] __alloc_pages_slowpath+0x2214/0x2870 [ 676.407249] ? warn_alloc+0x110/0x110 [ 676.411099] ? __lock_is_held+0xb6/0x140 [ 676.415193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.420790] ? should_fail+0x14d/0x85c [ 676.424731] ? __isolate_free_page+0x4c0/0x4c0 [ 676.429334] ? __might_sleep+0x95/0x190 [ 676.433436] __alloc_pages_nodemask+0x617/0x750 [ 676.438137] ? trace_hardirqs_on_caller+0x6a/0x220 [ 676.443094] ? __alloc_pages_slowpath+0x2870/0x2870 [ 676.448140] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.453697] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 676.459435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.464998] alloc_pages_current+0x107/0x210 [ 676.469434] ion_page_pool_alloc+0x17f/0x270 [ 676.473865] ion_system_heap_allocate+0x154/0xa90 [ 676.478739] ? ion_system_heap_free+0x250/0x250 [ 676.483432] ? ion_alloc+0x306/0x900 [ 676.487169] ion_alloc+0x29b/0x900 [ 676.491696] ? ion_dma_buf_release+0x50/0x50 [ 676.496148] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.501715] ? _copy_from_user+0xdd/0x150 [ 676.505891] ion_ioctl+0x17b/0x329 [ 676.509445] ? ion_alloc.cold+0x28/0x28 [ 676.513448] ? __might_sleep+0x95/0x190 [ 676.517560] ? ion_alloc.cold+0x28/0x28 [ 676.521741] do_vfs_ioctl+0xd5f/0x1380 [ 676.525791] ? selinux_file_ioctl+0x46c/0x5d0 [ 676.530307] ? selinux_file_ioctl+0x125/0x5d0 [ 676.534828] ? ioctl_preallocate+0x210/0x210 [ 676.539258] ? selinux_file_mprotect+0x620/0x620 [ 676.544043] ? iterate_fd+0x360/0x360 [ 676.547871] ? nsecs_to_jiffies+0x30/0x30 [ 676.552046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.557625] ? security_file_ioctl+0x8d/0xc0 [ 676.562178] ksys_ioctl+0xab/0xd0 [ 676.565655] __x64_sys_ioctl+0x73/0xb0 [ 676.569569] do_syscall_64+0xfd/0x620 [ 676.573390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.578594] RIP: 0033:0x45b399 [ 676.581801] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 676.600849] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 676.609829] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 676.617111] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 676.624481] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 676.631774] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 676.639063] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 676.640857] warn_alloc_show_mem: 1 callbacks suppressed [ 676.640862] Mem-Info: [ 676.659007] CPU: 0 PID: 6525 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 676.666845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.676214] Call Trace: [ 676.678825] dump_stack+0x197/0x210 [ 676.682486] warn_alloc.cold+0x7b/0x173 [ 676.686492] ? zone_watermark_ok_safe+0x260/0x260 [ 676.691467] ? compaction_deferred+0x16a/0x3b0 [ 676.696088] ? try_to_compact_pages+0x44/0xae0 [ 676.700716] __alloc_pages_slowpath+0x2214/0x2870 [ 676.705643] ? warn_alloc+0x110/0x110 [ 676.709466] ? __lock_is_held+0xb6/0x140 [ 676.713553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.719121] ? should_fail+0x14d/0x85c [ 676.723033] ? __isolate_free_page+0x4c0/0x4c0 [ 676.727639] ? __might_sleep+0x95/0x190 [ 676.731649] __alloc_pages_nodemask+0x617/0x750 [ 676.736342] ? __alloc_pages_slowpath+0x2870/0x2870 [ 676.741380] ? fs_reclaim_acquire+0x20/0x20 [ 676.745716] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.751290] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 676.757023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.762571] alloc_pages_current+0x107/0x210 [ 676.767007] ion_page_pool_alloc+0x17f/0x270 [ 676.771536] ion_system_heap_allocate+0x154/0xa90 [ 676.776399] ? ion_system_heap_free+0x250/0x250 [ 676.781081] ? ion_alloc+0x306/0x900 [ 676.784814] ion_alloc+0x29b/0x900 [ 676.788359] ? ion_dma_buf_release+0x50/0x50 [ 676.792904] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.798454] ? _copy_from_user+0xdd/0x150 [ 676.802612] ion_ioctl+0x17b/0x329 [ 676.806165] ? ion_alloc.cold+0x28/0x28 [ 676.810202] ? __might_sleep+0x95/0x190 [ 676.814199] ? ion_alloc.cold+0x28/0x28 [ 676.818194] do_vfs_ioctl+0xd5f/0x1380 [ 676.822102] ? selinux_file_ioctl+0x46c/0x5d0 [ 676.826617] ? selinux_file_ioctl+0x125/0x5d0 [ 676.831204] ? ioctl_preallocate+0x210/0x210 [ 676.835625] ? selinux_file_mprotect+0x620/0x620 [ 676.840405] ? iterate_fd+0x360/0x360 [ 676.844208] ? nsecs_to_jiffies+0x30/0x30 [ 676.848381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.853949] ? security_file_ioctl+0x8d/0xc0 [ 676.858377] ksys_ioctl+0xab/0xd0 [ 676.861832] __x64_sys_ioctl+0x73/0xb0 [ 676.865732] do_syscall_64+0xfd/0x620 [ 676.869548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.874750] RIP: 0033:0x45b399 [ 676.877960] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 676.897146] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 676.904922] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 676.912205] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 676.919493] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 676.926874] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 676.934270] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 676.941765] active_anon:331094 inactive_anon:208 isolated_anon:0 [ 676.941765] active_file:1891 inactive_file:2213 isolated_file:32 [ 676.941765] unevictable:0 dirty:117 writeback:0 unstable:0 [ 676.941765] slab_reclaimable:15524 slab_unreclaimable:114322 [ 676.941765] mapped:55471 shmem:397 pagetables:4631 bounce:0 [ 676.941765] free:896249 free_pcp:639 free_cma:0 [ 677.020568] Node 0 active_anon:1322244kB inactive_anon:832kB active_file:6880kB inactive_file:7680kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:220544kB dirty:460kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 589824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 20:09:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x4}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x10b) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, {&(0x7f0000000180)=""/190, 0xbe, &(0x7f0000000840)=""/4096, 0xd79be4fe2ec62566, 0x3}}, 0x48) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x10, 0x0, 0x25dfdbfb}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 677.063023] Node 0 DMA free:10380kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 677.110480] lowmem_reserve[]: 0 2545 2546 2546 2546 20:09:50 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 677.154394] Node 0 DMA32 free:37456kB min:36168kB low:45208kB high:54248kB active_anon:1322244kB inactive_anon:832kB active_file:6580kB inactive_file:7680kB unevictable:0kB writepending:460kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12128kB pagetables:18524kB bounce:0kB free_pcp:2984kB local_pcp:1476kB free_cma:0kB [ 677.187760] lowmem_reserve[]: 0 0 1 1 1 [ 677.222660] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 20:09:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x6}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 677.319561] lowmem_reserve[]: 0 0 0 0 0 [ 677.324693] Node 0 DMA: 1*4kB (U) 1*8kB (E) 6*16kB (UE) 9*32kB (UE) 3*64kB (UE) 5*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10700kB [ 677.386041] Node 0 DMA32: 648*4kB (UME) 199*8kB (UME) 115*16kB (UME) 842*32kB (UME) 310*64kB (UM) 162*128kB (UM) 25*256kB (U) 11*512kB (U) 25*1024kB (U) 8*2048kB (U) 1*4096kB (U) = 131656kB 20:09:50 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r0 = socket(0x2, 0x1000000000000002, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) sendfile(r0, r1, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:50 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 677.475504] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 677.552966] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 677.599713] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 677.637621] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 677.677829] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 677.709095] 5073 total pagecache pages [ 677.728492] 0 pages in swap cache [ 677.747010] Swap cache stats: add 0, delete 0, find 0/0 [ 677.767202] Free swap = 0kB [ 677.789643] Total swap = 0kB [ 677.806863] 1965979 pages RAM [ 677.818136] 0 pages HighMem/MovableOnly [ 677.844872] 341741 pages reserved [ 677.861531] 0 pages cma reserved 20:09:51 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xa}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r7, &(0x7f0000000040)=ANY=[@ANYBLOB="1000"/16], 0x10) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f00000000c0)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r0, &(0x7f0000000300)=""/43, 0x2b, 0x2000, 0x0, 0x35) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket(0x5, 0x1, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x23, &(0x7f0000000080)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002940)={r6, 0x2, 0x4, 0x1}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000180)={r6, @in={{0x2, 0x4e22, @broadcast}}, 0x101, 0x2}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000080)={r7, 0x80}, 0x8) 20:09:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xc}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 678.171589] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 678.260219] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 678.271856] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 678.271922] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 678.309996] CPU: 0 PID: 6792 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 678.317863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.327350] Call Trace: [ 678.329969] dump_stack+0x197/0x210 [ 678.333634] warn_alloc.cold+0x7b/0x173 [ 678.334064] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 678.337641] ? zone_watermark_ok_safe+0x260/0x260 [ 678.337660] ? __lock_is_held+0xb6/0x140 [ 678.337698] __alloc_pages_slowpath+0x2214/0x2870 [ 678.337730] ? warn_alloc+0x110/0x110 [ 678.353987] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 678.356843] ? __lock_is_held+0xb6/0x140 [ 678.356865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.356882] ? should_fail+0x14d/0x85c [ 678.356903] ? __isolate_free_page+0x4c0/0x4c0 [ 678.356924] ? __might_sleep+0x95/0x190 [ 678.388252] __alloc_pages_nodemask+0x617/0x750 [ 678.392957] ? __alloc_pages_slowpath+0x2870/0x2870 [ 678.398016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.403578] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 678.409412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.414991] alloc_pages_current+0x107/0x210 [ 678.419421] ion_page_pool_alloc+0x17f/0x270 [ 678.423847] ion_system_heap_allocate+0x154/0xa90 [ 678.428731] ? ion_system_heap_free+0x250/0x250 [ 678.433434] ? ion_alloc+0x306/0x900 [ 678.437168] ion_alloc+0x29b/0x900 [ 678.440727] ? ion_dma_buf_release+0x50/0x50 [ 678.445197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.450786] ? _copy_from_user+0xdd/0x150 [ 678.454958] ion_ioctl+0x17b/0x329 [ 678.458519] ? ion_alloc.cold+0x28/0x28 [ 678.462515] ? __might_sleep+0x95/0x190 [ 678.466533] ? ion_alloc.cold+0x28/0x28 [ 678.470532] do_vfs_ioctl+0xd5f/0x1380 [ 678.474430] ? selinux_file_ioctl+0x46c/0x5d0 [ 678.478950] ? selinux_file_ioctl+0x125/0x5d0 [ 678.483465] ? ioctl_preallocate+0x210/0x210 [ 678.487900] ? selinux_file_mprotect+0x620/0x620 [ 678.492684] ? iterate_fd+0x360/0x360 [ 678.496499] ? nsecs_to_jiffies+0x30/0x30 [ 678.500666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.506217] ? security_file_ioctl+0x8d/0xc0 [ 678.510626] ksys_ioctl+0xab/0xd0 [ 678.514082] __x64_sys_ioctl+0x73/0xb0 [ 678.517991] do_syscall_64+0xfd/0x620 [ 678.521813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.527015] RIP: 0033:0x45b399 [ 678.530218] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 678.549141] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 678.556859] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 678.564253] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 678.571520] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 678.578803] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 678.586075] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 678.596385] CPU: 1 PID: 6769 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 678.604212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.613681] Call Trace: [ 678.616294] dump_stack+0x197/0x210 [ 678.619963] warn_alloc.cold+0x7b/0x173 [ 678.623974] ? zone_watermark_ok_safe+0x260/0x260 [ 678.628844] ? __lock_is_held+0xb6/0x140 [ 678.632961] __alloc_pages_slowpath+0x2214/0x2870 [ 678.637995] ? warn_alloc+0x110/0x110 [ 678.641817] ? __lock_is_held+0xb6/0x140 [ 678.645899] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.651464] ? should_fail+0x14d/0x85c [ 678.655390] ? __isolate_free_page+0x4c0/0x4c0 [ 678.660006] ? __might_sleep+0x95/0x190 [ 678.664016] __alloc_pages_nodemask+0x617/0x750 [ 678.668725] ? __alloc_pages_slowpath+0x2870/0x2870 [ 678.673774] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.679342] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 678.685088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.686121] warn_alloc_show_mem: 2 callbacks suppressed [ 678.686127] Mem-Info: [ 678.690660] alloc_pages_current+0x107/0x210 [ 678.690684] ion_page_pool_alloc+0x17f/0x270 [ 678.690704] ion_system_heap_allocate+0x154/0xa90 [ 678.690728] ? ion_system_heap_free+0x250/0x250 [ 678.690745] ? ion_alloc+0x306/0x900 [ 678.690764] ion_alloc+0x29b/0x900 [ 678.724271] ? ion_dma_buf_release+0x50/0x50 [ 678.727810] active_anon:331631 inactive_anon:208 isolated_anon:10 [ 678.727810] active_file:2332 inactive_file:1819 isolated_file:0 [ 678.727810] unevictable:0 dirty:133 writeback:1 unstable:0 [ 678.727810] slab_reclaimable:15532 slab_unreclaimable:114507 [ 678.727810] mapped:55251 shmem:397 pagetables:4616 bounce:0 [ 678.727810] free:901060 free_pcp:361 free_cma:0 [ 678.728711] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.728727] ? _copy_from_user+0xdd/0x150 [ 678.728766] ion_ioctl+0x17b/0x329 [ 678.775994] ? ion_alloc.cold+0x28/0x28 [ 678.780174] ? __might_sleep+0x95/0x190 [ 678.784189] ? ion_alloc.cold+0x28/0x28 [ 678.788294] do_vfs_ioctl+0xd5f/0x1380 [ 678.792209] ? selinux_file_ioctl+0x46c/0x5d0 [ 678.796729] ? selinux_file_ioctl+0x125/0x5d0 [ 678.797357] Node 0 active_anon:1326484kB inactive_anon:832kB active_file:7816kB inactive_file:5652kB unevictable:0kB isolated(anon):40kB isolated(file):0kB mapped:219056kB dirty:524kB writeback:4kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 595968kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 678.801303] ? ioctl_preallocate+0x210/0x210 [ 678.801322] ? selinux_file_mprotect+0x620/0x620 [ 678.801344] ? iterate_fd+0x360/0x360 [ 678.801361] ? nsecs_to_jiffies+0x30/0x30 [ 678.801383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.801401] ? security_file_ioctl+0x8d/0xc0 [ 678.801419] ksys_ioctl+0xab/0xd0 20:09:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xe}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xf}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x10}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 678.801439] __x64_sys_ioctl+0x73/0xb0 [ 678.801459] do_syscall_64+0xfd/0x620 [ 678.801479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.801495] RIP: 0033:0x45b399 [ 678.876384] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 678.883409] Node 0 DMA free:10424kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 678.895308] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 678.895324] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 678.895331] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 678.895339] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 678.895346] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 678.895354] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 678.913428] CPU: 1 PID: 6886 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 678.973740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.983116] Call Trace: [ 678.985744] dump_stack+0x197/0x210 [ 678.989398] warn_alloc.cold+0x7b/0x173 [ 678.993424] ? zone_watermark_ok_safe+0x260/0x260 [ 678.998306] ? compaction_deferred+0x16a/0x3b0 [ 679.002923] ? try_to_compact_pages+0x44/0xae0 [ 679.007559] __alloc_pages_slowpath+0x2214/0x2870 [ 679.012467] ? warn_alloc+0x110/0x110 [ 679.016288] ? __lock_is_held+0xb6/0x140 [ 679.020487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 679.026060] ? should_fail+0x14d/0x85c [ 679.029973] ? __isolate_free_page+0x4c0/0x4c0 [ 679.034589] ? __might_sleep+0x95/0x190 [ 679.038591] __alloc_pages_nodemask+0x617/0x750 [ 679.043272] ? __alloc_pages_slowpath+0x2870/0x2870 [ 679.048314] ? kmem_cache_alloc_trace+0x5a7/0x760 [ 679.053171] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 679.058744] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 679.064468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.070023] alloc_pages_current+0x107/0x210 [ 679.074446] ion_page_pool_alloc+0x17f/0x270 [ 679.078876] ion_system_heap_allocate+0x154/0xa90 [ 679.083723] ? ion_system_heap_free+0x250/0x250 [ 679.088411] ion_alloc+0x29b/0x900 [ 679.091960] ? ion_dma_buf_release+0x50/0x50 [ 679.096374] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 679.101913] ? _copy_from_user+0xdd/0x150 [ 679.106060] ion_ioctl+0x17b/0x329 [ 679.109619] ? ion_alloc.cold+0x28/0x28 [ 679.113616] ? __might_sleep+0x95/0x190 [ 679.117589] ? ion_alloc.cold+0x28/0x28 [ 679.121562] do_vfs_ioctl+0xd5f/0x1380 [ 679.125445] ? selinux_file_ioctl+0x46c/0x5d0 [ 679.129931] ? selinux_file_ioctl+0x125/0x5d0 [ 679.134435] ? ioctl_preallocate+0x210/0x210 [ 679.138852] ? selinux_file_mprotect+0x620/0x620 [ 679.143630] ? iterate_fd+0x360/0x360 [ 679.147445] ? nsecs_to_jiffies+0x30/0x30 [ 679.151608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.157147] ? security_file_ioctl+0x8d/0xc0 [ 679.161574] ksys_ioctl+0xab/0xd0 [ 679.165034] __x64_sys_ioctl+0x73/0xb0 [ 679.168921] do_syscall_64+0xfd/0x620 [ 679.172735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.177933] RIP: 0033:0x45b399 [ 679.181126] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 679.200132] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:09:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) r4 = socket$inet6(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x1c, r7, 0x31905e13403123b7, 0x0, 0x0, {0xb, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r8, 0x0) r9 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000380)={0x32, @empty, 0x0, 0x0, 'none\x00', 0x4, 0x0, 0x3b}, 0x2c) r10 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) socket$inet_tcp(0x2, 0x1, 0x0) r11 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0x82000, 0x0) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r10, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f0000000140)={r12, @remote, @loopback}, 0xc) ioctl$FICLONE(r8, 0x40049409, r9) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000480)={'team0\x00', r12}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00', @ANYRES16=r7, @ANYBLOB="00032bbd7000fcdbdf250c000000060028000100000008000300", @ANYRES32=r12, @ANYBLOB="0500350010000000"], 0x2c}, 0x1, 0x0, 0x0, 0xc001}, 0x4000) sendmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) r13 = socket(0xa, 0x4000000001, 0x0) r14 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r15 = ioctl$KVM_CREATE_VM(r14, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r15, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r15, 0xae47, 0xd000) setsockopt$IP_VS_SO_SET_ADD(r13, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r16 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r16, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r13, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r13, 0x0, 0x8, &(0x7f0000000140)={r17, @remote, @loopback}, 0xc) r18 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x200, 0x40000) recvfrom$unix(r18, &(0x7f0000000180)=""/55, 0x37, 0x100, 0x0, 0x0) setsockopt$bt_BT_FLUSHABLE(r13, 0x112, 0x8, &(0x7f00000001c0)=0x4, 0x4) 20:09:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x60}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 679.207854] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 679.215207] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 679.222497] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 679.229784] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 679.237166] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 679.301335] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 679.307769] Node 0 DMA32 free:56008kB min:36168kB low:45208kB high:54248kB active_anon:1324196kB inactive_anon:832kB active_file:8696kB inactive_file:6416kB unevictable:0kB writepending:468kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12224kB pagetables:18452kB bounce:0kB free_pcp:2456kB local_pcp:1324kB free_cma:0kB [ 679.446490] lowmem_reserve[]: 0 0 1 1 1 [ 679.450843] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 679.489284] lowmem_reserve[]: 0 0 0 0 0 [ 679.526780] Node 0 DMA: 4*4kB (U) 3*8kB (UE) 3*16kB (UE) 9*32kB (UE) 1*64kB (E) 4*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10424kB [ 679.542476] Node 0 DMA32: 429*4kB (UME) 1032*8kB (UE) 1035*16kB (UE) 865*32kB (UE) 0*64kB 0*128kB 1*256kB (U) 1*512kB (U) 1*1024kB (U) 0*2048kB 0*4096kB = 56004kB [ 679.570607] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 679.587728] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 679.596953] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 679.611386] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 679.621041] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 679.632273] 5027 total pagecache pages [ 679.642379] 0 pages in swap cache [ 679.645883] Swap cache stats: add 0, delete 0, find 0/0 [ 679.651389] Free swap = 0kB [ 679.662377] Total swap = 0kB [ 679.665538] 1965979 pages RAM [ 679.668987] 0 pages HighMem/MovableOnly [ 679.673057] 341741 pages reserved 20:09:52 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r0 = socket(0x2, 0x1000000000000002, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) sendfile(r0, r1, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r7, &(0x7f0000000040)={0x10}, 0x10) ioctl$VIDIOC_ENUMAUDOUT(r7, 0xc0345642, &(0x7f00000000c0)={0xf0, "8f831ef6dfe38321d6484779be48dade5f4ff3ef8444796cf64a983c52d04f28"}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 679.676632] 0 pages cma reserved 20:09:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xf0}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2, 0x1000000000000002, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf9f4668c3543"], 0x35) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r3, 0x0, 0xffff, 0x9) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r2, r3, 0x0, 0x10001) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) write$FUSE_LK(r3, &(0x7f0000000080)={0x28, 0xffffffffffffffda, 0x1, {{0x9, 0xffffffffffffffff, 0x1, r4}}}, 0x28) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r6, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r5, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:52 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:52 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x300}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 679.947955] device macsec0 left promiscuous mode 20:09:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400210) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r6, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)='w', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r5, &(0x7f0000000300)=""/56, 0x38, 0x0, 0x0, 0x0) 20:09:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x600}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:53 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x6b6}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 680.321377] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 680.326712] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 680.335915] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 680.356384] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 680.383209] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 680.389895] CPU: 1 PID: 7034 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 680.397759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.407131] Call Trace: [ 680.409745] dump_stack+0x197/0x210 [ 680.413410] warn_alloc.cold+0x7b/0x173 [ 680.417425] ? zone_watermark_ok_safe+0x260/0x260 [ 680.422296] ? __lock_is_held+0xb6/0x140 [ 680.426410] __alloc_pages_slowpath+0x2214/0x2870 [ 680.431302] ? warn_alloc+0x110/0x110 [ 680.435128] ? __lock_is_held+0xb6/0x140 [ 680.439220] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 680.444884] ? should_fail+0x14d/0x85c [ 680.448799] ? __isolate_free_page+0x4c0/0x4c0 [ 680.453430] ? __might_sleep+0x95/0x190 [ 680.457429] __alloc_pages_nodemask+0x617/0x750 [ 680.462134] ? __alloc_pages_slowpath+0x2870/0x2870 [ 680.467186] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 680.472751] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 680.478501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.484068] alloc_pages_current+0x107/0x210 [ 680.488506] ion_page_pool_alloc+0x17f/0x270 [ 680.492939] ion_system_heap_allocate+0x154/0xa90 [ 680.497818] ? ion_system_heap_free+0x250/0x250 [ 680.502507] ? ion_alloc+0x306/0x900 [ 680.506244] ion_alloc+0x29b/0x900 [ 680.509819] ? ion_dma_buf_release+0x50/0x50 [ 680.514256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 680.519816] ? _copy_from_user+0xdd/0x150 [ 680.524102] ion_ioctl+0x17b/0x329 [ 680.527669] ? ion_alloc.cold+0x28/0x28 [ 680.531673] ? __might_sleep+0x95/0x190 [ 680.535668] ? ion_alloc.cold+0x28/0x28 [ 680.539654] do_vfs_ioctl+0xd5f/0x1380 [ 680.543549] ? selinux_file_ioctl+0x46c/0x5d0 [ 680.548140] ? selinux_file_ioctl+0x125/0x5d0 [ 680.552655] ? ioctl_preallocate+0x210/0x210 [ 680.557075] ? selinux_file_mprotect+0x620/0x620 [ 680.561851] ? iterate_fd+0x360/0x360 [ 680.565668] ? nsecs_to_jiffies+0x30/0x30 [ 680.569841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.575487] ? security_file_ioctl+0x8d/0xc0 [ 680.580011] ksys_ioctl+0xab/0xd0 [ 680.583467] __x64_sys_ioctl+0x73/0xb0 [ 680.587380] do_syscall_64+0xfd/0x620 [ 680.591197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.596395] RIP: 0033:0x45b399 [ 680.599585] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.618494] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 680.626214] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 20:09:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xa00}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 680.633492] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 680.640774] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 680.648056] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 680.655333] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 680.662633] CPU: 0 PID: 7037 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 680.670453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.679821] Call Trace: [ 680.682436] dump_stack+0x197/0x210 [ 680.686091] warn_alloc.cold+0x7b/0x173 [ 680.690094] ? zone_watermark_ok_safe+0x260/0x260 [ 680.694960] ? __lock_is_held+0xb6/0x140 [ 680.699070] __alloc_pages_slowpath+0x2214/0x2870 [ 680.703954] ? warn_alloc+0x110/0x110 [ 680.707775] ? __lock_is_held+0xb6/0x140 [ 680.711864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 680.717422] ? should_fail+0x14d/0x85c [ 680.721333] ? __isolate_free_page+0x4c0/0x4c0 [ 680.725926] ? __might_sleep+0x95/0x190 [ 680.730039] __alloc_pages_nodemask+0x617/0x750 [ 680.734727] ? __alloc_pages_slowpath+0x2870/0x2870 [ 680.739751] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 680.745307] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 680.751030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.756577] alloc_pages_current+0x107/0x210 [ 680.761010] ion_page_pool_alloc+0x17f/0x270 [ 680.765429] ion_system_heap_allocate+0x154/0xa90 [ 680.770292] ? ion_system_heap_free+0x250/0x250 [ 680.774978] ? ion_alloc+0x306/0x900 [ 680.778695] ion_alloc+0x29b/0x900 [ 680.782258] ? ion_dma_buf_release+0x50/0x50 [ 680.786692] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 680.792239] ? _copy_from_user+0xdd/0x150 [ 680.796410] ion_ioctl+0x17b/0x329 [ 680.799947] ? ion_alloc.cold+0x28/0x28 [ 680.803938] ? __might_sleep+0x95/0x190 [ 680.807915] ? ion_alloc.cold+0x28/0x28 [ 680.811904] do_vfs_ioctl+0xd5f/0x1380 [ 680.815802] ? selinux_file_ioctl+0x46c/0x5d0 [ 680.820312] ? selinux_file_ioctl+0x125/0x5d0 [ 680.824823] ? ioctl_preallocate+0x210/0x210 [ 680.829248] ? selinux_file_mprotect+0x620/0x620 [ 680.834013] ? iterate_fd+0x360/0x360 [ 680.837829] ? nsecs_to_jiffies+0x30/0x30 [ 680.841994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.847545] ? security_file_ioctl+0x8d/0xc0 [ 680.851957] ksys_ioctl+0xab/0xd0 [ 680.855428] __x64_sys_ioctl+0x73/0xb0 [ 680.859331] do_syscall_64+0xfd/0x620 [ 680.863147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.868360] RIP: 0033:0x45b399 [ 680.871563] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.890480] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 680.898205] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 680.905488] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 680.912766] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 680.920033] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 680.927295] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 680.948600] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 680.954299] CPU: 1 PID: 7025 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 680.962117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.971490] Call Trace: [ 680.974107] dump_stack+0x197/0x210 [ 680.977768] warn_alloc.cold+0x7b/0x173 [ 680.981777] ? zone_watermark_ok_safe+0x260/0x260 [ 680.986652] ? __lock_is_held+0xb6/0x140 [ 680.990772] __alloc_pages_slowpath+0x2214/0x2870 [ 680.993669] warn_alloc_show_mem: 2 callbacks suppressed [ 680.993674] Mem-Info: [ 680.995657] ? warn_alloc+0x110/0x110 [ 680.995673] ? __lock_is_held+0xb6/0x140 [ 680.995692] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 680.995708] ? should_fail+0x14d/0x85c [ 680.995744] ? __isolate_free_page+0x4c0/0x4c0 [ 680.995763] ? __might_sleep+0x95/0x190 [ 680.995783] __alloc_pages_nodemask+0x617/0x750 [ 681.003635] active_anon:332102 inactive_anon:205 isolated_anon:0 [ 681.003635] active_file:2670 inactive_file:1859 isolated_file:7 [ 681.003635] unevictable:0 dirty:138 writeback:0 unstable:0 [ 681.003635] slab_reclaimable:15562 slab_unreclaimable:114692 [ 681.003635] mapped:55521 shmem:397 pagetables:4604 bounce:0 [ 681.003635] free:914046 free_pcp:291 free_cma:0 [ 681.007425] ? __alloc_pages_slowpath+0x2870/0x2870 [ 681.007447] ? retint_kernel+0x2d/0x2d [ 681.007462] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.007482] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 681.007496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.007517] alloc_pages_current+0x107/0x210 [ 681.007541] ion_page_pool_alloc+0x17f/0x270 [ 681.007562] ion_system_heap_allocate+0x154/0xa90 [ 681.013532] Node 0 active_anon:1328408kB inactive_anon:820kB active_file:8900kB inactive_file:5788kB unevictable:0kB isolated(anon):0kB isolated(file):28kB mapped:219828kB dirty:544kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 593920kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 681.017284] ? ion_system_heap_free+0x250/0x250 [ 681.017303] ? ion_alloc+0x306/0x900 [ 681.017321] ion_alloc+0x29b/0x900 [ 681.017360] ? ion_dma_buf_release+0x50/0x50 [ 681.017385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.017401] ? _copy_from_user+0xdd/0x150 [ 681.017421] ion_ioctl+0x17b/0x329 [ 681.017438] ? ion_alloc.cold+0x28/0x28 [ 681.017459] ? __might_sleep+0x95/0x190 [ 681.017478] ? ion_alloc.cold+0x28/0x28 [ 681.017502] do_vfs_ioctl+0xd5f/0x1380 [ 681.022132] Node 0 DMA free:10424kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 681.025969] ? selinux_file_ioctl+0x46c/0x5d0 [ 681.025985] ? selinux_file_ioctl+0x125/0x5d0 [ 681.026003] ? ioctl_preallocate+0x210/0x210 [ 681.026019] ? selinux_file_mprotect+0x620/0x620 [ 681.026040] ? iterate_fd+0x360/0x360 [ 681.026057] ? nsecs_to_jiffies+0x30/0x30 [ 681.026078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.026097] ? security_file_ioctl+0x8d/0xc0 [ 681.026116] ksys_ioctl+0xab/0xd0 [ 681.026132] __x64_sys_ioctl+0x73/0xb0 [ 681.026151] do_syscall_64+0xfd/0x620 [ 681.031472] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 681.034917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.034929] RIP: 0033:0x45b399 [ 681.034945] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.034953] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 681.034965] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 681.034973] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 681.034981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 681.034989] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 681.034998] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 681.341327] Node 0 DMA32 free:59948kB min:36168kB low:45208kB high:54248kB active_anon:1323852kB inactive_anon:820kB active_file:8976kB inactive_file:5592kB unevictable:0kB writepending:544kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12000kB pagetables:18120kB bounce:0kB free_pcp:1924kB local_pcp:652kB free_cma:0kB [ 681.371421] lowmem_reserve[]: 0 0 1 1 1 [ 681.375705] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 681.402325] lowmem_reserve[]: 0 0 0 0 0 [ 681.406495] Node 0 DMA: 4*4kB (U) 3*8kB (UE) 3*16kB (UE) 9*32kB (UE) 1*64kB (E) 2*128kB (UE) 2*256kB (UE) 4*512kB (UE) 3*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10424kB [ 681.422478] Node 0 DMA32: 713*4kB (UME) 1006*8kB (UME) 1035*16kB (UE) 871*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 2*2048kB (M) 0*4096kB = 59428kB [ 681.437074] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 681.448240] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 681.457464] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 681.467207] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 681.476404] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 681.486544] 4909 total pagecache pages [ 681.490551] 0 pages in swap cache [ 681.494326] Swap cache stats: add 0, delete 0, find 0/0 20:09:54 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 681.499880] Free swap = 0kB [ 681.503170] Total swap = 0kB [ 681.506204] 1965979 pages RAM [ 681.509411] 0 pages HighMem/MovableOnly [ 681.513562] 341741 pages reserved [ 681.517098] 0 pages cma reserved 20:09:54 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xc00}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:54 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:54 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r3 = getpid() rt_tgsigqueueinfo(0x0, r3, 0x0, 0x0) ptrace(0x10, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r4, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000440)=ANY=[@ANYBLOB="05000000487b68ad9cd17dcd2f2b9865476db455639314ad65ca3a8127b3540f6af2452c77d133868cad957f5116ffb8611c79a67cf2ec9335c849cabc1f4637146ad0579a19aa16d8aaeeeaf126a81833c5a5fc183684d20b3212c3a8d7735c2358cef0d328104101d4e2d153a7d944e48b764e6423a24b29adad131a4809b02049db90188860ea219ba5671ce0140e27cfc6e5b5cbc8a3369dd57c6af0cf0c2f4b20274c140fe27e965ed5bf675871d7"]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x600, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r8, 0x80845663, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xe00}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 681.690659] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 681.691501] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 681.714020] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 681.728497] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 681.736828] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 681.746077] CPU: 1 PID: 7184 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 681.753918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.763286] Call Trace: [ 681.765894] dump_stack+0x197/0x210 [ 681.769542] warn_alloc.cold+0x7b/0x173 [ 681.773531] ? zone_watermark_ok_safe+0x260/0x260 [ 681.778389] ? __lock_is_held+0xb6/0x140 [ 681.782491] __alloc_pages_slowpath+0x2214/0x2870 [ 681.787380] ? warn_alloc+0x110/0x110 [ 681.791205] ? __lock_is_held+0xb6/0x140 [ 681.795151] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 681.795280] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.806182] ? should_fail+0x14d/0x85c [ 681.810123] ? __isolate_free_page+0x4c0/0x4c0 [ 681.814723] ? __might_sleep+0x95/0x190 [ 681.818728] __alloc_pages_nodemask+0x617/0x750 [ 681.823411] ? __alloc_pages_slowpath+0x2870/0x2870 [ 681.828440] ? fs_reclaim_acquire+0x20/0x20 [ 681.832769] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.838321] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 681.844063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.849614] alloc_pages_current+0x107/0x210 [ 681.854033] ion_page_pool_alloc+0x17f/0x270 [ 681.858555] ion_system_heap_allocate+0x154/0xa90 [ 681.863427] ? ion_system_heap_free+0x250/0x250 [ 681.868117] ? ion_alloc+0x306/0x900 [ 681.871846] ion_alloc+0x29b/0x900 [ 681.875416] ? ion_dma_buf_release+0x50/0x50 [ 681.879851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.885412] ? _copy_from_user+0xdd/0x150 [ 681.889582] ion_ioctl+0x17b/0x329 [ 681.893137] ? ion_alloc.cold+0x28/0x28 [ 681.897136] ? __might_sleep+0x95/0x190 [ 681.901127] ? ion_alloc.cold+0x28/0x28 [ 681.905106] do_vfs_ioctl+0xd5f/0x1380 [ 681.909000] ? selinux_file_ioctl+0x46c/0x5d0 [ 681.913511] ? selinux_file_ioctl+0x125/0x5d0 [ 681.918031] ? ioctl_preallocate+0x210/0x210 [ 681.922456] ? selinux_file_mprotect+0x620/0x620 [ 681.927239] ? iterate_fd+0x360/0x360 [ 681.931061] ? nsecs_to_jiffies+0x30/0x30 [ 681.935230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.940773] ? security_file_ioctl+0x8d/0xc0 [ 681.945195] ksys_ioctl+0xab/0xd0 [ 681.948667] __x64_sys_ioctl+0x73/0xb0 [ 681.952570] do_syscall_64+0xfd/0x620 [ 681.956398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.961601] RIP: 0033:0x45b399 [ 681.964908] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.983828] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 681.991563] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 681.998851] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 682.006131] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 682.013415] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 682.020714] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 682.049497] CPU: 0 PID: 7181 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 682.057349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.066735] Call Trace: [ 682.069358] dump_stack+0x197/0x210 [ 682.073011] warn_alloc.cold+0x7b/0x173 [ 682.077037] ? zone_watermark_ok_safe+0x260/0x260 [ 682.081899] ? __lock_is_held+0xb6/0x140 [ 682.086010] __alloc_pages_slowpath+0x2214/0x2870 [ 682.090914] ? warn_alloc+0x110/0x110 [ 682.094729] ? __lock_is_held+0xb6/0x140 [ 682.098805] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.104360] ? should_fail+0x14d/0x85c [ 682.108282] ? __isolate_free_page+0x4c0/0x4c0 [ 682.112881] ? __might_sleep+0x95/0x190 [ 682.116879] __alloc_pages_nodemask+0x617/0x750 [ 682.121681] ? __alloc_pages_slowpath+0x2870/0x2870 [ 682.126707] ? fs_reclaim_acquire+0x20/0x20 [ 682.131046] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.136634] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 682.142371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.147940] alloc_pages_current+0x107/0x210 [ 682.152380] ion_page_pool_alloc+0x17f/0x270 [ 682.156811] ion_system_heap_allocate+0x154/0xa90 [ 682.161696] ? ion_system_heap_free+0x250/0x250 [ 682.166423] ? ion_alloc+0x306/0x900 [ 682.170152] ion_alloc+0x29b/0x900 [ 682.173729] ? ion_dma_buf_release+0x50/0x50 [ 682.178182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.183873] ? _copy_from_user+0xdd/0x150 [ 682.188050] ion_ioctl+0x17b/0x329 [ 682.191628] ? ion_alloc.cold+0x28/0x28 [ 682.195657] ? __might_sleep+0x95/0x190 [ 682.199660] ? ion_alloc.cold+0x28/0x28 [ 682.203739] do_vfs_ioctl+0xd5f/0x1380 [ 682.207661] ? selinux_file_ioctl+0x46c/0x5d0 [ 682.212171] ? selinux_file_ioctl+0x125/0x5d0 [ 682.216811] ? ioctl_preallocate+0x210/0x210 [ 682.221330] ? selinux_file_mprotect+0x620/0x620 [ 682.226250] ? iterate_fd+0x360/0x360 [ 682.230096] ? nsecs_to_jiffies+0x30/0x30 [ 682.234273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.240039] ? security_file_ioctl+0x8d/0xc0 [ 682.244475] ksys_ioctl+0xab/0xd0 [ 682.247970] __x64_sys_ioctl+0x73/0xb0 [ 682.251893] do_syscall_64+0xfd/0x620 [ 682.255734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.260969] RIP: 0033:0x45b399 [ 682.264302] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.283345] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 682.291093] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 682.298425] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 682.305891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 682.313295] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 682.320693] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 682.328861] warn_alloc_show_mem: 2 callbacks suppressed [ 682.328866] Mem-Info: [ 682.330354] CPU: 1 PID: 7177 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 682.337122] active_anon:331081 inactive_anon:207 isolated_anon:36 [ 682.337122] active_file:2648 inactive_file:1963 isolated_file:12 [ 682.337122] unevictable:0 dirty:139 writeback:2 unstable:0 [ 682.337122] slab_reclaimable:15547 slab_unreclaimable:115102 [ 682.337122] mapped:55580 shmem:397 pagetables:4605 bounce:0 [ 682.337122] free:861622 free_pcp:213 free_cma:0 [ 682.344493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.344500] Call Trace: [ 682.344525] dump_stack+0x197/0x210 [ 682.344551] warn_alloc.cold+0x7b/0x173 [ 682.344570] ? zone_watermark_ok_safe+0x260/0x260 [ 682.344585] ? __lock_is_held+0xb6/0x140 [ 682.344620] __alloc_pages_slowpath+0x2214/0x2870 [ 682.344651] ? warn_alloc+0x110/0x110 [ 682.344663] ? __lock_is_held+0xb6/0x140 [ 682.344681] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.344695] ? should_fail+0x14d/0x85c [ 682.344713] ? __isolate_free_page+0x4c0/0x4c0 [ 682.344753] ? __might_sleep+0x95/0x190 20:09:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x7480, 0x10000) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000840)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c8050000d0010000d001000000000000d001000000000000f8040000f8040000f8040000f8040000f804000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"/1480], 0x628) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r3 = getpid() rt_tgsigqueueinfo(0x0, r3, 0x0, 0x0) ptrace(0x10, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r4, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r3, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 682.399503] Node 0 active_anon:1324324kB inactive_anon:828kB active_file:8812kB inactive_file:6204kB unevictable:0kB isolated(anon):144kB isolated(file):48kB mapped:220264kB dirty:548kB writeback:8kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 589824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 682.402981] __alloc_pages_nodemask+0x617/0x750 [ 682.403006] ? __alloc_pages_slowpath+0x2870/0x2870 [ 682.403029] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.403047] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 682.403059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.403080] alloc_pages_current+0x107/0x210 20:09:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xf00}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 682.407320] Node 0 DMA free:10424kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 682.411993] ion_page_pool_alloc+0x17f/0x270 [ 682.412016] ion_system_heap_allocate+0x154/0xa90 [ 682.412044] ? ion_system_heap_free+0x250/0x250 [ 682.416033] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 682.420020] ? ion_alloc+0x306/0x900 [ 682.420044] ion_alloc+0x29b/0x900 20:09:55 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 682.420067] ? ion_dma_buf_release+0x50/0x50 [ 682.420090] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.425819] Node 0 DMA32 free:53972kB min:36168kB low:45208kB high:54248kB active_anon:1324396kB inactive_anon:828kB active_file:9268kB inactive_file:6288kB unevictable:0kB writepending:508kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12224kB pagetables:18420kB bounce:0kB free_pcp:976kB local_pcp:576kB free_cma:0kB [ 682.429509] ? _copy_from_user+0xdd/0x150 [ 682.429532] ion_ioctl+0x17b/0x329 20:09:55 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 682.429551] ? ion_alloc.cold+0x28/0x28 [ 682.429571] ? __might_sleep+0x95/0x190 [ 682.429590] ? ion_alloc.cold+0x28/0x28 [ 682.434466] lowmem_reserve[]: 0 0 1 1 1 [ 682.438243] do_vfs_ioctl+0xd5f/0x1380 [ 682.438267] ? selinux_file_ioctl+0x46c/0x5d0 [ 682.438282] ? selinux_file_ioctl+0x125/0x5d0 [ 682.438300] ? ioctl_preallocate+0x210/0x210 [ 682.467684] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 682.471452] ? selinux_file_mprotect+0x620/0x620 [ 682.471477] ? iterate_fd+0x360/0x360 [ 682.471494] ? nsecs_to_jiffies+0x30/0x30 [ 682.471516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.476712] lowmem_reserve[]: 0 0 0 0 0 [ 682.482080] ? security_file_ioctl+0x8d/0xc0 [ 682.482100] ksys_ioctl+0xab/0xd0 [ 682.482120] __x64_sys_ioctl+0x73/0xb0 [ 682.482137] do_syscall_64+0xfd/0x620 [ 682.482159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.488071] Node 0 DMA: 4*4kB (U) 3*8kB (UE) 3*16kB (UE) 9*32kB (UE) 1*64kB (E) 2*128kB (UE) 2*256kB (UE) 4*512kB (UE) 3*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10424kB [ 682.493418] RIP: 0033:0x45b399 [ 682.493437] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.493445] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 682.493459] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 682.493468] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 682.493476] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 682.493484] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 682.493492] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:09:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x3f00}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 682.793059] Node 0 DMA32: 2*4kB (UM) 525*8kB (UE) 1025*16kB (UE) 865*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 48288kB [ 682.807039] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 682.818694] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 682.828199] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 682.837984] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 682.890655] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 682.949948] 5027 total pagecache pages [ 682.982471] 0 pages in swap cache [ 682.986175] Swap cache stats: add 0, delete 0, find 0/0 [ 683.007673] Free swap = 0kB [ 683.020802] Total swap = 0kB 20:09:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x4000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 683.030813] 1965979 pages RAM [ 683.047854] 0 pages HighMem/MovableOnly [ 683.073980] 341741 pages reserved [ 683.095827] 0 pages cma reserved 20:09:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x404000c) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r8 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r8) waitid(0x1, r8, &(0x7f00000000c0), 0x2, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x5865}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 683.196312] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 683.256027] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 683.284695] CPU: 1 PID: 7317 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 683.292541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.301915] Call Trace: [ 683.304534] dump_stack+0x197/0x210 [ 683.308298] warn_alloc.cold+0x7b/0x173 [ 683.312509] ? zone_watermark_ok_safe+0x260/0x260 [ 683.317379] ? compaction_deferred+0x16a/0x3b0 [ 683.321992] ? try_to_compact_pages+0x44/0xae0 [ 683.326624] __alloc_pages_slowpath+0x2214/0x2870 [ 683.331518] ? warn_alloc+0x110/0x110 [ 683.335342] ? __lock_is_held+0xb6/0x140 [ 683.339437] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 683.345008] ? should_fail+0x14d/0x85c [ 683.348923] ? __isolate_free_page+0x4c0/0x4c0 [ 683.353534] ? __might_sleep+0x95/0x190 [ 683.357609] __alloc_pages_nodemask+0x617/0x750 [ 683.362326] ? __alloc_pages_slowpath+0x2870/0x2870 [ 683.367377] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 683.373096] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 683.378832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.384405] alloc_pages_current+0x107/0x210 [ 683.388851] ion_page_pool_alloc+0x17f/0x270 [ 683.393293] ion_system_heap_allocate+0x154/0xa90 [ 683.398215] ? ion_system_heap_free+0x250/0x250 [ 683.402948] ? ion_alloc+0x306/0x900 [ 683.406811] ion_alloc+0x29b/0x900 [ 683.410389] ? ion_dma_buf_release+0x50/0x50 [ 683.414845] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 683.420557] ? _copy_from_user+0xdd/0x150 [ 683.424767] ion_ioctl+0x17b/0x329 [ 683.428330] ? ion_alloc.cold+0x28/0x28 [ 683.432350] ? __might_sleep+0x95/0x190 [ 683.436375] ? ion_alloc.cold+0x28/0x28 [ 683.440362] do_vfs_ioctl+0xd5f/0x1380 [ 683.444271] ? selinux_file_ioctl+0x46c/0x5d0 [ 683.448772] ? selinux_file_ioctl+0x125/0x5d0 [ 683.453283] ? ioctl_preallocate+0x210/0x210 [ 683.457715] ? selinux_file_mprotect+0x620/0x620 [ 683.462492] ? iterate_fd+0x360/0x360 [ 683.466307] ? nsecs_to_jiffies+0x30/0x30 [ 683.470464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.476013] ? security_file_ioctl+0x8d/0xc0 [ 683.480422] ksys_ioctl+0xab/0xd0 [ 683.483890] __x64_sys_ioctl+0x73/0xb0 [ 683.487806] do_syscall_64+0xfd/0x620 [ 683.491625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.496822] RIP: 0033:0x45b399 [ 683.500008] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.518918] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 683.526638] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 683.533914] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 683.541193] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 683.548480] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 683.555758] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 683.566432] warn_alloc_show_mem: 2 callbacks suppressed [ 683.566438] Mem-Info: [ 683.575180] active_anon:330522 inactive_anon:208 isolated_anon:0 [ 683.575180] active_file:2264 inactive_file:1562 isolated_file:0 [ 683.575180] unevictable:0 dirty:143 writeback:0 unstable:0 [ 683.575180] slab_reclaimable:15563 slab_unreclaimable:115027 [ 683.575180] mapped:55169 shmem:397 pagetables:4622 bounce:0 [ 683.575180] free:812110 free_pcp:436 free_cma:0 [ 683.610052] Node 0 active_anon:1322088kB inactive_anon:832kB active_file:7276kB inactive_file:4600kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:218380kB dirty:564kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 683.680187] Node 0 DMA free:10416kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 683.718058] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 683.727406] Node 0 DMA32 free:56900kB min:36168kB low:45208kB high:54248kB active_anon:1322144kB inactive_anon:832kB active_file:7264kB inactive_file:4656kB unevictable:0kB writepending:568kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12128kB pagetables:18312kB bounce:0kB free_pcp:1608kB local_pcp:460kB free_cma:0kB [ 683.780501] lowmem_reserve[]: 0 0 1 1 1 [ 683.788457] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 683.829227] lowmem_reserve[]: 0 0 0 0 0 20:09:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x20}, 0x1c}}, 0x0) r6 = dup3(r3, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r7, 0x100, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x24000802}, 0x40000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) r8 = socket(0xb, 0x800, 0x81) bind$inet6(r8, &(0x7f00000000c0)={0xa, 0x4e21, 0xa000, @rand_addr="ac29ecf79be40da124ddfd2fa297cf32", 0xf4}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:56 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x6000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:56 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:56 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 683.841517] Node 0 DMA: 2*4kB (U) 5*8kB (UE) 6*16kB (UE) 9*32kB (UE) 2*64kB (UE) 1*128kB (E) 2*256kB (UE) 4*512kB (UE) 3*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10416kB [ 683.953139] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 683.954373] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 683.964861] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 683.983350] Node 0 DMA32: 1168*4kB (UME) 954*8kB (UME) 1011*16kB (UE) 867*32kB (UME) 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 57248kB [ 683.999039] CPU: 0 PID: 7535 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 684.006879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.016384] Call Trace: [ 684.018997] dump_stack+0x197/0x210 [ 684.022929] warn_alloc.cold+0x7b/0x173 [ 684.026926] ? zone_watermark_ok_safe+0x260/0x260 [ 684.031802] ? compaction_deferred+0x16a/0x3b0 [ 684.036429] ? try_to_compact_pages+0x44/0xae0 [ 684.041075] __alloc_pages_slowpath+0x2214/0x2870 [ 684.045971] ? warn_alloc+0x110/0x110 [ 684.049797] ? __lock_is_held+0xb6/0x140 [ 684.053894] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 684.062006] ? should_fail+0x14d/0x85c [ 684.065945] ? __isolate_free_page+0x4c0/0x4c0 [ 684.070568] ? __might_sleep+0x95/0x190 [ 684.074580] __alloc_pages_nodemask+0x617/0x750 [ 684.078346] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 684.079266] ? retint_kernel+0x2d/0x2d [ 684.079289] ? __alloc_pages_slowpath+0x2870/0x2870 [ 684.093660] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 684.099340] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 684.105094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.110677] alloc_pages_current+0x107/0x210 [ 684.115112] ion_page_pool_alloc+0x17f/0x270 [ 684.123972] ion_system_heap_allocate+0x154/0xa90 [ 684.128855] ? ion_system_heap_free+0x250/0x250 [ 684.133549] ? ion_alloc+0x306/0x900 [ 684.137289] ion_alloc+0x29b/0x900 [ 684.140882] ? ion_dma_buf_release+0x50/0x50 [ 684.145328] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 684.151003] ? _copy_from_user+0xdd/0x150 [ 684.155205] ion_ioctl+0x17b/0x329 [ 684.158775] ? ion_alloc.cold+0x28/0x28 [ 684.162778] ? __might_sleep+0x95/0x190 [ 684.166870] ? ion_alloc.cold+0x28/0x28 [ 684.171177] do_vfs_ioctl+0xd5f/0x1380 [ 684.175091] ? selinux_file_ioctl+0x46c/0x5d0 [ 684.181135] ? selinux_file_ioctl+0x125/0x5d0 [ 684.185826] ? ioctl_preallocate+0x210/0x210 [ 684.190781] ? selinux_file_mprotect+0x620/0x620 [ 684.195572] ? iterate_fd+0x360/0x360 [ 684.199401] ? nsecs_to_jiffies+0x30/0x30 [ 684.203705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.209271] ? security_file_ioctl+0x8d/0xc0 [ 684.213723] ksys_ioctl+0xab/0xd0 [ 684.217193] __x64_sys_ioctl+0x73/0xb0 [ 684.221113] do_syscall_64+0xfd/0x620 [ 684.225384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.230591] RIP: 0033:0x45b399 [ 684.233815] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 684.252954] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 684.260770] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 684.268078] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 684.275366] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 684.282652] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 684.290298] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:09:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x6558}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 684.311087] CPU: 1 PID: 7539 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 684.319058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.324256] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 684.329391] Call Trace: [ 684.329418] dump_stack+0x197/0x210 [ 684.329444] warn_alloc.cold+0x7b/0x173 [ 684.329461] ? zone_watermark_ok_safe+0x260/0x260 [ 684.329478] ? compaction_deferred+0x16a/0x3b0 [ 684.329495] ? try_to_compact_pages+0x44/0xae0 [ 684.329530] __alloc_pages_slowpath+0x2214/0x2870 [ 684.329563] ? warn_alloc+0x110/0x110 [ 684.365864] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 684.369651] ? __lock_is_held+0xb6/0x140 [ 684.369672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 684.369688] ? should_fail+0x14d/0x85c [ 684.369706] ? __isolate_free_page+0x4c0/0x4c0 [ 684.369726] ? __might_sleep+0x95/0x190 [ 684.369745] __alloc_pages_nodemask+0x617/0x750 20:09:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x8100}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 684.369765] ? __alloc_pages_slowpath+0x2870/0x2870 [ 684.369783] ? fs_reclaim_acquire+0x20/0x20 [ 684.369801] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 684.395749] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 684.396657] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 684.401405] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 684.405279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.405301] alloc_pages_current+0x107/0x210 [ 684.405325] ion_page_pool_alloc+0x17f/0x270 [ 684.405348] ion_system_heap_allocate+0x154/0xa90 [ 684.424167] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 684.424911] ? ion_system_heap_free+0x250/0x250 [ 684.424930] ? ion_alloc+0x306/0x900 [ 684.424950] ion_alloc+0x29b/0x900 [ 684.424972] ? ion_dma_buf_release+0x50/0x50 [ 684.424995] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 684.434516] 4378 total pagecache pages [ 684.439392] ? _copy_from_user+0xdd/0x150 [ 684.439414] ion_ioctl+0x17b/0x329 [ 684.439431] ? ion_alloc.cold+0x28/0x28 [ 684.439452] ? __might_sleep+0x95/0x190 [ 684.439468] ? ion_alloc.cold+0x28/0x28 [ 684.439484] do_vfs_ioctl+0xd5f/0x1380 [ 684.439501] ? selinux_file_ioctl+0x46c/0x5d0 [ 684.439521] ? selinux_file_ioctl+0x125/0x5d0 [ 684.439539] ? ioctl_preallocate+0x210/0x210 [ 684.472907] 0 pages in swap cache [ 684.477334] ? selinux_file_mprotect+0x620/0x620 [ 684.477357] ? iterate_fd+0x360/0x360 [ 684.477374] ? nsecs_to_jiffies+0x30/0x30 [ 684.477395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.477411] ? security_file_ioctl+0x8d/0xc0 [ 684.477430] ksys_ioctl+0xab/0xd0 [ 684.482450] Swap cache stats: add 0, delete 0, find 0/0 [ 684.485853] __x64_sys_ioctl+0x73/0xb0 [ 684.485873] do_syscall_64+0xfd/0x620 [ 684.485896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.490196] Free swap = 0kB [ 684.493845] RIP: 0033:0x45b399 [ 684.493862] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 684.493870] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 684.493884] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 684.493893] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 684.493901] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 684.493909] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 684.493916] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 684.575578] Mem-Info: [ 684.665714] Total swap = 0kB [ 684.668797] 1965979 pages RAM [ 684.711839] 0 pages HighMem/MovableOnly [ 684.742373] 341741 pages reserved [ 684.772315] 0 pages cma reserved [ 684.826758] active_anon:330561 inactive_anon:208 isolated_anon:0 [ 684.826758] active_file:2186 inactive_file:1592 isolated_file:0 [ 684.826758] unevictable:0 dirty:144 writeback:0 unstable:0 [ 684.826758] slab_reclaimable:15564 slab_unreclaimable:115571 [ 684.826758] mapped:55049 shmem:397 pagetables:4669 bounce:0 [ 684.826758] free:841077 free_pcp:553 free_cma:0 [ 684.865619] Node 0 active_anon:1322144kB inactive_anon:832kB active_file:6964kB inactive_file:4720kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:217800kB dirty:568kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 20:09:57 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:57 executing program 5: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xb606}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861", 0xfffffffc}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r4 = getpid() rt_tgsigqueueinfo(0x0, r4, 0x0, 0x0) ptrace(0x10, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) r8 = dup3(r5, r6, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f00000001c0)={0x5}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r4, 0x0, 0xffffffffffffffff, 0x0) r9 = accept4$llc(r3, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x10, 0x80000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r9, 0x8982, &(0x7f0000000180)={0x6, 'netdevsim0\x00', {0x5}, 0x8}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:09:58 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 684.907510] Node 0 DMA free:10416kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 20:09:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xf000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 685.230814] lowmem_reserve[]: 0 2545 2546 2546 2546 20:09:58 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 685.274147] Node 0 DMA32 free:56692kB min:36168kB low:45208kB high:54248kB active_anon:1323904kB inactive_anon:832kB active_file:6448kB inactive_file:4520kB unevictable:0kB writepending:568kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12032kB pagetables:18528kB bounce:0kB free_pcp:2408kB local_pcp:1220kB free_cma:0kB [ 685.392364] lowmem_reserve[]: 0 0 1 1 1 [ 685.397217] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 685.513112] lowmem_reserve[]: 0 0 0 0 0 [ 685.568887] Node 0 DMA: 2*4kB (U) 5*8kB (UE) 6*16kB (UE) 9*32kB (UE) 10*64kB (UE) 3*128kB (UE) 2*256kB (UE) 4*512kB (UE) 3*1024kB (UE) 2*2048kB (ME) 0*4096kB = 11184kB [ 685.634796] Node 0 DMA32: 1177*4kB (UME) 650*8kB (UME) 611*16kB (UE) 878*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (U) 0*4096kB = 49828kB [ 685.650370] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 685.678293] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 685.702648] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 685.720144] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 685.741824] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 685.762361] 4078 total pagecache pages [ 685.766371] 0 pages in swap cache [ 685.771087] Swap cache stats: add 0, delete 0, find 0/0 [ 685.792475] Free swap = 0kB [ 685.795584] Total swap = 0kB [ 685.798675] 1965979 pages RAM [ 685.801845] 0 pages HighMem/MovableOnly [ 685.811066] 341741 pages reserved [ 685.831150] 0 pages cma reserved [ 685.851183] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 20:09:58 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xf0ffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:09:58 executing program 5: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:58 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:09:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x7f, 0x40022, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 685.952361] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 685.975360] CPU: 0 PID: 7668 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 685.983287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.992683] Call Trace: [ 685.995314] dump_stack+0x197/0x210 [ 685.998970] warn_alloc.cold+0x7b/0x173 [ 686.002968] ? zone_watermark_ok_safe+0x260/0x260 [ 686.007838] ? __lock_is_held+0xb6/0x140 [ 686.011954] __alloc_pages_slowpath+0x2214/0x2870 [ 686.016843] ? warn_alloc+0x110/0x110 [ 686.020663] ? __lock_is_held+0xb6/0x140 [ 686.024749] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.030334] ? should_fail+0x14d/0x85c [ 686.034251] ? __isolate_free_page+0x4c0/0x4c0 [ 686.038854] ? __might_sleep+0x95/0x190 [ 686.042878] __alloc_pages_nodemask+0x617/0x750 [ 686.047590] ? __alloc_pages_slowpath+0x2870/0x2870 [ 686.052645] ? retint_kernel+0x2d/0x2d [ 686.056674] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.062242] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 686.067983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.073741] alloc_pages_current+0x107/0x210 [ 686.078177] ion_page_pool_alloc+0x17f/0x270 [ 686.082619] ion_system_heap_allocate+0x154/0xa90 [ 686.087494] ? ion_system_heap_free+0x250/0x250 [ 686.092192] ? ion_alloc+0x306/0x900 [ 686.095939] ion_alloc+0x29b/0x900 [ 686.099506] ? ion_dma_buf_release+0x50/0x50 [ 686.104033] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.109592] ? _copy_from_user+0xdd/0x150 [ 686.113781] ion_ioctl+0x17b/0x329 [ 686.117353] ? ion_alloc.cold+0x28/0x28 [ 686.121476] ? __might_sleep+0x95/0x190 [ 686.125647] ? ion_alloc.cold+0x28/0x28 [ 686.130399] do_vfs_ioctl+0xd5f/0x1380 [ 686.134366] ? selinux_file_ioctl+0x46c/0x5d0 [ 686.138889] ? selinux_file_ioctl+0x125/0x5d0 [ 686.143426] ? ioctl_preallocate+0x210/0x210 [ 686.148833] ? selinux_file_mprotect+0x620/0x620 [ 686.154580] ? iterate_fd+0x360/0x360 [ 686.158407] ? nsecs_to_jiffies+0x30/0x30 [ 686.162600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.168157] ? security_file_ioctl+0x8d/0xc0 [ 686.172589] ksys_ioctl+0xab/0xd0 [ 686.176070] __x64_sys_ioctl+0x73/0xb0 [ 686.179997] do_syscall_64+0xfd/0x620 [ 686.183852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.189077] RIP: 0033:0x45b399 [ 686.192288] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 686.211307] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 686.219027] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 686.226295] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 686.234276] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 686.241576] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 686.248876] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 686.313443] warn_alloc_show_mem: 1 callbacks suppressed [ 686.313449] Mem-Info: [ 686.328222] active_anon:330519 inactive_anon:205 isolated_anon:11 [ 686.328222] active_file:1953 inactive_file:1169 isolated_file:0 [ 686.328222] unevictable:0 dirty:69 writeback:0 unstable:0 [ 686.328222] slab_reclaimable:15569 slab_unreclaimable:115900 [ 686.328222] mapped:54436 shmem:397 pagetables:4635 bounce:0 [ 686.328222] free:907008 free_pcp:381 free_cma:0 [ 686.393330] Node 0 active_anon:1321912kB inactive_anon:812kB active_file:5360kB inactive_file:2564kB unevictable:0kB isolated(anon):44kB isolated(file):0kB mapped:214912kB dirty:268kB writeback:0kB shmem:1576kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 686.442370] Node 0 DMA free:10416kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 686.477580] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 686.488272] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 686.499967] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 686.506295] CPU: 0 PID: 7800 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 686.510952] Node 0 DMA32 free:56040kB min:36168kB low:45208kB high:54248kB active_anon:1322056kB inactive_anon:812kB active_file:5132kB inactive_file:3060kB unevictable:0kB writepending:356kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12000kB pagetables:18476kB bounce:0kB free_pcp:632kB local_pcp:632kB free_cma:0kB [ 686.514230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.514236] Call Trace: [ 686.514259] dump_stack+0x197/0x210 [ 686.514282] warn_alloc.cold+0x7b/0x173 [ 686.514300] ? zone_watermark_ok_safe+0x260/0x260 [ 686.514316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 686.514336] ? retint_kernel+0x2d/0x2d [ 686.514369] __alloc_pages_slowpath+0x2214/0x2870 [ 686.569995] lowmem_reserve[]: 0 0 1 1 1 [ 686.574454] ? warn_alloc+0x110/0x110 [ 686.574471] ? __lock_is_held+0xb6/0x140 [ 686.574488] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.574505] ? should_fail+0x14d/0x85c [ 686.574521] ? __isolate_free_page+0x4c0/0x4c0 [ 686.574542] ? __might_sleep+0x95/0x190 [ 686.574563] __alloc_pages_nodemask+0x617/0x750 [ 686.579209] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 686.583317] ? __alloc_pages_slowpath+0x2870/0x2870 [ 686.583337] ? fs_reclaim_acquire+0x20/0x20 [ 686.583353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.583370] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 686.583384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.583405] alloc_pages_current+0x107/0x210 [ 686.583428] ion_page_pool_alloc+0x17f/0x270 [ 686.583448] ion_system_heap_allocate+0x154/0xa90 [ 686.583470] ? ion_system_heap_free+0x250/0x250 [ 686.592268] lowmem_reserve[]: 0 0 0 0 0 [ 686.596287] ? ion_alloc+0x306/0x900 [ 686.601877] Node 0 DMA: 2*4kB (U) 5*8kB (UE) 6*16kB (UE) 9*32kB (UE) 2*64kB (UE) 1*128kB (E) 2*256kB (UE) 4*512kB (UE) 3*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10416kB [ 686.605790] ion_alloc+0x29b/0x900 [ 686.605813] ? ion_dma_buf_release+0x50/0x50 [ 686.605837] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.605850] ? _copy_from_user+0xdd/0x150 [ 686.605869] ion_ioctl+0x17b/0x329 [ 686.605887] ? ion_alloc.cold+0x28/0x28 [ 686.605909] ? __might_sleep+0x95/0x190 [ 686.605923] ? ion_alloc.cold+0x28/0x28 [ 686.605942] do_vfs_ioctl+0xd5f/0x1380 [ 686.615425] Node 0 DMA32: 1530*4kB (UME) 1098*8kB (UME) 833*16kB (UE) 888*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 56648kB [ 686.619362] ? selinux_file_ioctl+0x46c/0x5d0 [ 686.651175] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 686.655452] ? selinux_file_ioctl+0x125/0x5d0 [ 686.655470] ? ioctl_preallocate+0x210/0x210 [ 686.655486] ? selinux_file_mprotect+0x620/0x620 [ 686.655506] ? iterate_fd+0x360/0x360 [ 686.655522] ? nsecs_to_jiffies+0x30/0x30 [ 686.655544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.655558] ? security_file_ioctl+0x8d/0xc0 [ 686.655576] ksys_ioctl+0xab/0xd0 [ 686.661126] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 686.666941] __x64_sys_ioctl+0x73/0xb0 [ 686.666960] do_syscall_64+0xfd/0x620 [ 686.666980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.666991] RIP: 0033:0x45b399 [ 686.667007] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 686.667014] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 686.667028] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 686.667037] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 686.667046] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 686.667054] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 686.667063] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 686.911567] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 686.920286] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 686.929229] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 686.939155] 2989 total pagecache pages [ 686.943237] 0 pages in swap cache [ 686.947148] Swap cache stats: add 0, delete 0, find 0/0 [ 686.953125] Free swap = 0kB [ 686.956351] Total swap = 0kB [ 686.959537] 1965979 pages RAM [ 686.963230] 0 pages HighMem/MovableOnly [ 686.967414] 341741 pages reserved [ 686.971044] 0 pages cma reserved 20:10:00 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:00 executing program 5: set_mempolicy(0x0, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:00 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:00 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x1000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:00 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x1, 0xd3) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:10:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x2000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:00 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x3000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 687.684237] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 687.685575] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 687.696326] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 687.718757] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 687.725168] CPU: 1 PID: 7924 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 687.732993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.742378] Call Trace: [ 687.745004] dump_stack+0x197/0x210 [ 687.748664] warn_alloc.cold+0x7b/0x173 [ 687.752663] ? zone_watermark_ok_safe+0x260/0x260 [ 687.757532] ? __lock_is_held+0xb6/0x140 [ 687.761645] __alloc_pages_slowpath+0x2214/0x2870 [ 687.766534] ? warn_alloc+0x110/0x110 [ 687.770357] ? __lock_is_held+0xb6/0x140 [ 687.774449] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 687.780011] ? should_fail+0x14d/0x85c [ 687.783930] ? __isolate_free_page+0x4c0/0x4c0 [ 687.788544] ? __might_sleep+0x95/0x190 [ 687.792553] __alloc_pages_nodemask+0x617/0x750 [ 687.797335] ? __alloc_pages_slowpath+0x2870/0x2870 [ 687.802425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 687.807992] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 687.813986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.819562] alloc_pages_current+0x107/0x210 [ 687.824004] ion_page_pool_alloc+0x17f/0x270 [ 687.828448] ion_system_heap_allocate+0x154/0xa90 [ 687.833328] ? ion_system_heap_free+0x250/0x250 [ 687.838026] ? ion_alloc+0x306/0x900 [ 687.841767] ion_alloc+0x29b/0x900 [ 687.845360] ? ion_dma_buf_release+0x50/0x50 [ 687.849798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 687.855357] ? _copy_from_user+0xdd/0x150 [ 687.859542] ion_ioctl+0x17b/0x329 [ 687.863286] ? ion_alloc.cold+0x28/0x28 [ 687.867290] ? __might_sleep+0x95/0x190 [ 687.871403] ? ion_alloc.cold+0x28/0x28 [ 687.875406] do_vfs_ioctl+0xd5f/0x1380 [ 687.879854] ? selinux_file_ioctl+0x46c/0x5d0 [ 687.884557] ? selinux_file_ioctl+0x125/0x5d0 [ 687.889223] ? ioctl_preallocate+0x210/0x210 [ 687.893664] ? selinux_file_mprotect+0x620/0x620 [ 687.898432] ? iterate_fd+0x360/0x360 [ 687.902242] ? nsecs_to_jiffies+0x30/0x30 [ 687.906521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.912084] ? security_file_ioctl+0x8d/0xc0 [ 687.916592] ksys_ioctl+0xab/0xd0 [ 687.920050] __x64_sys_ioctl+0x73/0xb0 [ 687.923944] do_syscall_64+0xfd/0x620 [ 687.927764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.932947] RIP: 0033:0x45b399 [ 687.936136] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 687.955036] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 687.962751] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 687.970016] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 687.977290] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:10:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x4000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 687.984561] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 687.991824] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 688.048861] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 688.072381] CPU: 1 PID: 7939 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 688.076741] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 688.080231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.080237] Call Trace: [ 688.080263] dump_stack+0x197/0x210 [ 688.080287] warn_alloc.cold+0x7b/0x173 [ 688.080306] ? zone_watermark_ok_safe+0x260/0x260 [ 688.080327] ? __lock_is_held+0xb6/0x140 [ 688.118586] __alloc_pages_slowpath+0x2214/0x2870 [ 688.123472] ? warn_alloc+0x110/0x110 [ 688.127282] ? __lock_is_held+0xb6/0x140 [ 688.131356] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.136907] ? should_fail+0x14d/0x85c [ 688.140809] ? __isolate_free_page+0x4c0/0x4c0 [ 688.145424] ? __might_sleep+0x95/0x190 [ 688.149455] __alloc_pages_nodemask+0x617/0x750 [ 688.154149] ? __alloc_pages_slowpath+0x2870/0x2870 [ 688.159414] ? fs_reclaim_acquire+0x20/0x20 [ 688.163755] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.169488] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 688.176446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.181994] alloc_pages_current+0x107/0x210 [ 688.186426] ion_page_pool_alloc+0x17f/0x270 [ 688.190847] ion_system_heap_allocate+0x154/0xa90 [ 688.195718] ? ion_system_heap_free+0x250/0x250 [ 688.200395] ? ion_alloc+0x306/0x900 [ 688.204127] ion_alloc+0x29b/0x900 [ 688.207689] ? ion_dma_buf_release+0x50/0x50 [ 688.212258] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.217826] ? _copy_from_user+0xdd/0x150 [ 688.221995] ion_ioctl+0x17b/0x329 [ 688.225547] ? ion_alloc.cold+0x28/0x28 [ 688.229535] ? __might_sleep+0x95/0x190 [ 688.233525] ? ion_alloc.cold+0x28/0x28 [ 688.237510] do_vfs_ioctl+0xd5f/0x1380 [ 688.241402] ? selinux_file_ioctl+0x46c/0x5d0 [ 688.245915] ? selinux_file_ioctl+0x125/0x5d0 [ 688.250417] ? ioctl_preallocate+0x210/0x210 [ 688.254844] ? selinux_file_mprotect+0x620/0x620 [ 688.259611] ? iterate_fd+0x360/0x360 [ 688.263427] ? nsecs_to_jiffies+0x30/0x30 [ 688.267593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.273136] ? security_file_ioctl+0x8d/0xc0 [ 688.277547] ksys_ioctl+0xab/0xd0 [ 688.281140] __x64_sys_ioctl+0x73/0xb0 [ 688.285031] do_syscall_64+0xfd/0x620 [ 688.288849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.294036] RIP: 0033:0x45b399 [ 688.297226] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.316233] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.324053] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 688.331333] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 688.338620] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 688.346104] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 688.353487] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 688.360798] CPU: 0 PID: 7923 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 688.368624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.371218] warn_alloc_show_mem: 1 callbacks suppressed [ 688.371223] Mem-Info: [ 688.377987] Call Trace: [ 688.378014] dump_stack+0x197/0x210 [ 688.378035] warn_alloc.cold+0x7b/0x173 [ 688.378053] ? zone_watermark_ok_safe+0x260/0x260 [ 688.378070] ? __lock_is_held+0xb6/0x140 [ 688.378113] __alloc_pages_slowpath+0x2214/0x2870 [ 688.378149] ? warn_alloc+0x110/0x110 [ 688.383914] active_anon:331559 inactive_anon:208 isolated_anon:19 [ 688.383914] active_file:2011 inactive_file:1551 isolated_file:0 [ 688.383914] unevictable:0 dirty:10 writeback:0 unstable:0 [ 688.383914] slab_reclaimable:15590 slab_unreclaimable:115651 [ 688.383914] mapped:54548 shmem:397 pagetables:4587 bounce:0 [ 688.383914] free:867277 free_pcp:461 free_cma:0 [ 688.385949] ? __lock_is_held+0xb6/0x140 [ 688.385969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.385988] ? should_fail+0x14d/0x85c [ 688.388656] Node 0 active_anon:1326224kB inactive_anon:832kB active_file:5796kB inactive_file:3924kB unevictable:0kB isolated(anon):76kB isolated(file):0kB mapped:215184kB dirty:36kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 598016kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 688.392191] ? __isolate_free_page+0x4c0/0x4c0 [ 688.392212] ? __might_sleep+0x95/0x190 [ 688.392233] __alloc_pages_nodemask+0x617/0x750 [ 688.392254] ? __alloc_pages_slowpath+0x2870/0x2870 [ 688.392281] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.392303] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 688.396597] Node 0 DMA free:10452kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 688.401114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.401135] alloc_pages_current+0x107/0x210 [ 688.401157] ion_page_pool_alloc+0x17f/0x270 [ 688.405519] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 688.410271] ion_system_heap_allocate+0x154/0xa90 [ 688.410298] ? ion_system_heap_free+0x250/0x250 [ 688.414398] Node 0 DMA32 free:59620kB min:36168kB low:45208kB high:54248kB active_anon:1326224kB inactive_anon:832kB active_file:5876kB inactive_file:3980kB unevictable:0kB writepending:184kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12064kB pagetables:18348kB bounce:0kB free_pcp:1844kB local_pcp:900kB free_cma:0kB [ 688.447804] ? ion_alloc+0x306/0x900 [ 688.447825] ion_alloc+0x29b/0x900 [ 688.447847] ? ion_dma_buf_release+0x50/0x50 [ 688.447871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.447887] ? _copy_from_user+0xdd/0x150 [ 688.447904] ion_ioctl+0x17b/0x329 [ 688.447921] ? ion_alloc.cold+0x28/0x28 [ 688.447941] ? __might_sleep+0x95/0x190 [ 688.447960] ? ion_alloc.cold+0x28/0x28 [ 688.452397] lowmem_reserve[]: 0 0 1 1 1 [ 688.457567] do_vfs_ioctl+0xd5f/0x1380 [ 688.457594] ? selinux_file_ioctl+0x46c/0x5d0 [ 688.457614] ? selinux_file_ioctl+0x125/0x5d0 [ 688.461567] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 688.489721] ? ioctl_preallocate+0x210/0x210 [ 688.489741] ? selinux_file_mprotect+0x620/0x620 [ 688.489761] ? iterate_fd+0x360/0x360 20:10:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x6000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:01 executing program 5: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:01 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:01 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0xa000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000100)={0x3, 0xfff, 0x5c}) r1 = socket$inet6(0xa, 0x6, 0x89) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7cd2}, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x4000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) sysfs$1(0x1, &(0x7f0000000180)='-$\x00') syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x8, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @rand_addr, @dev}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 688.489778] ? nsecs_to_jiffies+0x30/0x30 [ 688.489802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.489817] ? security_file_ioctl+0x8d/0xc0 [ 688.489834] ksys_ioctl+0xab/0xd0 [ 688.489853] __x64_sys_ioctl+0x73/0xb0 [ 688.489871] do_syscall_64+0xfd/0x620 [ 688.489890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.489900] RIP: 0033:0x45b399 [ 688.489918] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.495000] lowmem_reserve[]: 0 0 0 0 0 [ 688.498466] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.498481] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 688.498489] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 688.498497] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 688.498505] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 688.498518] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 688.503505] Node 0 DMA: 1*4kB (U) 2*8kB (UE) 6*16kB (UE) 9*32kB (UE) 7*64kB (UE) 9*128kB (UE) 5*256kB (UE) 4*512kB (UE) 1*1024kB (E) 2*2048kB (ME) 0*4096kB = 10452kB 20:10:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xa000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:01 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 688.847248] Node 0 DMA32: 1046*4kB (UE) 1109*8kB (UE) 734*16kB (UE) 890*32kB (UE) 1*64kB (U) 1*128kB (U) 0*256kB 0*512kB 6*1024kB (U) 0*2048kB 0*4096kB = 59616kB [ 688.899214] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 688.936428] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 688.990938] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:10:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xc000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 689.082307] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 689.109223] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 689.152381] 4740 total pagecache pages [ 689.163397] 0 pages in swap cache [ 689.175895] Swap cache stats: add 0, delete 0, find 0/0 [ 689.190622] Free swap = 0kB [ 689.198842] Total swap = 0kB 20:10:02 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x5}, 0x1c}}, 0x0) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r9, 0x100, 0x70bd28, 0x25dfdbfc}, 0x14}}, 0x4044004) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:10:02 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xe000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 689.212324] 1965979 pages RAM [ 689.215469] 0 pages HighMem/MovableOnly [ 689.219448] 341741 pages reserved [ 689.242474] 0 pages cma reserved 20:10:02 executing program 5: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xf000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x10000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 689.582352] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 689.601341] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 689.613775] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 689.657457] CPU: 1 PID: 8228 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 689.665329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.667185] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 689.674699] Call Trace: [ 689.674728] dump_stack+0x197/0x210 [ 689.674754] warn_alloc.cold+0x7b/0x173 [ 689.674771] ? zone_watermark_ok_safe+0x260/0x260 [ 689.674787] ? compaction_deferred+0x16a/0x3b0 [ 689.674805] ? try_to_compact_pages+0x44/0xae0 [ 689.674834] __alloc_pages_slowpath+0x2214/0x2870 [ 689.709271] ? warn_alloc+0x110/0x110 [ 689.713091] ? __lock_is_held+0xb6/0x140 [ 689.717170] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 689.722739] ? should_fail+0x14d/0x85c [ 689.726664] ? __isolate_free_page+0x4c0/0x4c0 [ 689.731271] ? __might_sleep+0x95/0x190 [ 689.735279] __alloc_pages_nodemask+0x617/0x750 [ 689.739971] ? __alloc_pages_slowpath+0x2870/0x2870 [ 689.745021] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 689.750603] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 689.756354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.761915] alloc_pages_current+0x107/0x210 [ 689.766340] ion_page_pool_alloc+0x17f/0x270 [ 689.770756] ion_system_heap_allocate+0x154/0xa90 [ 689.775622] ? ion_system_heap_free+0x250/0x250 [ 689.780318] ? ion_alloc+0x306/0x900 [ 689.784071] ion_alloc+0x29b/0x900 [ 689.787631] ? ion_dma_buf_release+0x50/0x50 [ 689.792085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 689.797639] ? _copy_from_user+0xdd/0x150 [ 689.801818] ion_ioctl+0x17b/0x329 20:10:02 executing program 5: set_mempolicy(0x2, 0x0, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 689.805371] ? ion_alloc.cold+0x28/0x28 [ 689.809363] ? __might_sleep+0x95/0x190 [ 689.813346] ? ion_alloc.cold+0x28/0x28 [ 689.817335] do_vfs_ioctl+0xd5f/0x1380 [ 689.821234] ? selinux_file_ioctl+0x46c/0x5d0 [ 689.825732] ? selinux_file_ioctl+0x125/0x5d0 [ 689.830227] ? ioctl_preallocate+0x210/0x210 [ 689.834646] ? selinux_file_mprotect+0x620/0x620 [ 689.839417] ? iterate_fd+0x360/0x360 [ 689.843228] ? nsecs_to_jiffies+0x30/0x30 [ 689.847402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.853058] ? security_file_ioctl+0x8d/0xc0 [ 689.857491] ksys_ioctl+0xab/0xd0 [ 689.860953] __x64_sys_ioctl+0x73/0xb0 [ 689.864849] do_syscall_64+0xfd/0x620 [ 689.868672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.873874] RIP: 0033:0x45b399 [ 689.877116] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.896035] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 689.903765] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 689.911065] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 689.918375] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 689.925679] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 689.932975] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 689.940413] CPU: 0 PID: 8225 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 689.948253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.957620] Call Trace: [ 689.960238] dump_stack+0x197/0x210 [ 689.963889] warn_alloc.cold+0x7b/0x173 [ 689.967891] ? zone_watermark_ok_safe+0x260/0x260 [ 689.972755] ? compaction_deferred+0x16a/0x3b0 [ 689.977372] ? try_to_compact_pages+0x44/0xae0 [ 689.981993] __alloc_pages_slowpath+0x2214/0x2870 [ 689.986881] ? warn_alloc+0x110/0x110 [ 689.990791] ? __lock_is_held+0xb6/0x140 [ 689.994873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.000427] ? should_fail+0x14d/0x85c [ 690.004339] ? __isolate_free_page+0x4c0/0x4c0 [ 690.008944] ? __might_sleep+0x95/0x190 [ 690.012941] __alloc_pages_nodemask+0x617/0x750 [ 690.017633] ? retint_kernel+0x2d/0x2d [ 690.021546] ? __alloc_pages_slowpath+0x2870/0x2870 [ 690.026593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.032159] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 690.037885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.043447] alloc_pages_current+0x107/0x210 [ 690.047895] ion_page_pool_alloc+0x17f/0x270 [ 690.052327] ion_system_heap_allocate+0x154/0xa90 [ 690.057201] ? ion_system_heap_free+0x250/0x250 [ 690.061889] ? ion_alloc+0x306/0x900 [ 690.065636] ion_alloc+0x29b/0x900 [ 690.069195] ? ion_dma_buf_release+0x50/0x50 [ 690.073633] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.079201] ? _copy_from_user+0xdd/0x150 [ 690.083388] ion_ioctl+0x17b/0x329 [ 690.086943] ? ion_alloc.cold+0x28/0x28 [ 690.090930] ? __might_sleep+0x95/0x190 [ 690.094953] ? ion_alloc.cold+0x28/0x28 [ 690.098966] do_vfs_ioctl+0xd5f/0x1380 [ 690.102874] ? selinux_file_ioctl+0x46c/0x5d0 [ 690.107391] ? selinux_file_ioctl+0x125/0x5d0 [ 690.111969] ? ioctl_preallocate+0x210/0x210 [ 690.116422] ? selinux_file_mprotect+0x620/0x620 [ 690.121199] ? iterate_fd+0x360/0x360 [ 690.125022] ? nsecs_to_jiffies+0x30/0x30 [ 690.129205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.134881] ? security_file_ioctl+0x8d/0xc0 [ 690.139330] ksys_ioctl+0xab/0xd0 [ 690.142812] __x64_sys_ioctl+0x73/0xb0 [ 690.146728] do_syscall_64+0xfd/0x620 [ 690.150596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.155815] RIP: 0033:0x45b399 [ 690.159027] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.177950] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 690.185681] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 690.192971] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 690.200274] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:10:03 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) socket(0x2, 0x1000000000000002, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 690.207573] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 690.214885] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:10:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x3f000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$bt_hci_HCI_TIME_STAMP(r7, 0x0, 0x3, &(0x7f00000000c0)=0x8, 0x4) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 690.362375] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 690.387129] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 690.401085] CPU: 0 PID: 8350 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 690.408942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.418317] Call Trace: [ 690.420932] dump_stack+0x197/0x210 [ 690.424624] warn_alloc.cold+0x7b/0x173 [ 690.428632] ? zone_watermark_ok_safe+0x260/0x260 [ 690.433497] ? compaction_deferred+0x16a/0x3b0 [ 690.438110] ? try_to_compact_pages+0x44/0xae0 [ 690.442736] __alloc_pages_slowpath+0x2214/0x2870 [ 690.447623] ? warn_alloc+0x110/0x110 [ 690.451443] ? __lock_is_held+0xb6/0x140 [ 690.455533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.461100] ? should_fail+0x14d/0x85c [ 690.465015] ? __isolate_free_page+0x4c0/0x4c0 [ 690.469630] ? __might_sleep+0x95/0x190 [ 690.473640] __alloc_pages_nodemask+0x617/0x750 [ 690.478338] ? __alloc_pages_slowpath+0x2870/0x2870 [ 690.483388] ? fs_reclaim_acquire+0x20/0x20 [ 690.487738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.493311] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 690.499182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.504970] alloc_pages_current+0x107/0x210 [ 690.509418] ion_page_pool_alloc+0x17f/0x270 [ 690.513868] ion_system_heap_allocate+0x154/0xa90 [ 690.518750] ? ion_system_heap_free+0x250/0x250 [ 690.523446] ? ion_alloc+0x306/0x900 [ 690.527192] ion_alloc+0x29b/0x900 [ 690.530761] ? ion_dma_buf_release+0x50/0x50 [ 690.535205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.540766] ? _copy_from_user+0xdd/0x150 [ 690.544941] ion_ioctl+0x17b/0x329 [ 690.548510] ? ion_alloc.cold+0x28/0x28 [ 690.552627] ? __might_sleep+0x95/0x190 [ 690.556634] ? ion_alloc.cold+0x28/0x28 [ 690.560630] do_vfs_ioctl+0xd5f/0x1380 [ 690.564539] ? selinux_file_ioctl+0x46c/0x5d0 [ 690.569093] ? selinux_file_ioctl+0x125/0x5d0 [ 690.573637] ? ioctl_preallocate+0x210/0x210 [ 690.578084] ? selinux_file_mprotect+0x620/0x620 [ 690.582868] ? iterate_fd+0x360/0x360 [ 690.586800] ? nsecs_to_jiffies+0x30/0x30 [ 690.590976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.596542] ? security_file_ioctl+0x8d/0xc0 [ 690.600970] ksys_ioctl+0xab/0xd0 [ 690.604443] __x64_sys_ioctl+0x73/0xb0 [ 690.608365] do_syscall_64+0xfd/0x620 [ 690.612191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.617401] RIP: 0033:0x45b399 [ 690.620611] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.639289] warn_alloc_show_mem: 2 callbacks suppressed [ 690.639295] Mem-Info: [ 690.639523] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 690.645970] active_anon:331550 inactive_anon:207 isolated_anon:0 [ 690.645970] active_file:2269 inactive_file:1959 isolated_file:0 [ 690.645970] unevictable:0 dirty:56 writeback:13 unstable:0 [ 690.645970] slab_reclaimable:15583 slab_unreclaimable:116278 [ 690.645970] mapped:55205 shmem:397 pagetables:4580 bounce:0 [ 690.645970] free:852577 free_pcp:338 free_cma:0 [ 690.647310] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 690.647320] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 690.647328] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:10:03 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 690.647340] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 690.656599] Node 0 active_anon:1326200kB inactive_anon:828kB active_file:6828kB inactive_file:5556kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:217704kB dirty:208kB writeback:52kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 591872kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 690.688843] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 690.767980] Node 0 DMA free:10452kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 690.812377] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 690.819162] Node 0 DMA32 free:62916kB min:36168kB low:45208kB high:54248kB active_anon:1328320kB inactive_anon:832kB active_file:6884kB inactive_file:5504kB unevictable:0kB writepending:284kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12224kB pagetables:18420kB bounce:0kB free_pcp:1204kB local_pcp:376kB free_cma:0kB [ 690.941384] lowmem_reserve[]: 0 0 1 1 1 [ 690.966743] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 691.026633] lowmem_reserve[]: 0 0 0 0 0 [ 691.030911] Node 0 DMA: 1*4kB (U) 1*8kB (E) 3*16kB (UE) 9*32kB (UE) 7*64kB (UE) 9*128kB (UE) 5*256kB (UE) 4*512kB (UE) 1*1024kB (E) 2*2048kB (ME) 0*4096kB = 10396kB [ 691.054076] Node 0 DMA32: 401*4kB (ME) 113*8kB (UME) 41*16kB (ME) 376*32kB (UE) 123*64kB (U) 177*128kB (U) 8*256kB (UM) 3*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 49308kB [ 691.084503] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 691.100595] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 691.120440] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 691.133559] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 691.143802] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 691.153700] 4780 total pagecache pages [ 691.162945] 0 pages in swap cache [ 691.172177] Swap cache stats: add 0, delete 0, find 0/0 [ 691.189122] Free swap = 0kB [ 691.204264] Total swap = 0kB [ 691.209183] 1965979 pages RAM [ 691.216080] 0 pages HighMem/MovableOnly [ 691.222383] 341741 pages reserved [ 691.225878] 0 pages cma reserved 20:10:04 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x40000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:04 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:04 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) r7 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r7) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x40, 0x6, {r7}, {}, 0x1, 0x200}) r9 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa2008, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9}, 0x33, 0x0, 0x200000000000df8, 0x5, 0x0, 0xfff}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r10, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5a450, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b, 0x0, 0x0, 0x0, 0x0, 0x3fc9}, 0xffffffffffffffff, 0x0, r10, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:10:04 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) socket(0x2, 0x1000000000000002, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x60000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x65580000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x81000000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 692.008633] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 692.026734] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 692.027781] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 692.034019] CPU: 1 PID: 8481 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 20:10:05 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0), 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 692.043993] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 692.051475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.051481] Call Trace: [ 692.051513] dump_stack+0x197/0x210 [ 692.051535] warn_alloc.cold+0x7b/0x173 [ 692.051556] ? zone_watermark_ok_safe+0x260/0x260 [ 692.087245] ? __lock_is_held+0xb6/0x140 [ 692.091365] __alloc_pages_slowpath+0x2214/0x2870 [ 692.096253] ? warn_alloc+0x110/0x110 [ 692.100178] ? __lock_is_held+0xb6/0x140 [ 692.104376] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.109944] ? should_fail+0x14d/0x85c [ 692.113860] ? __isolate_free_page+0x4c0/0x4c0 [ 692.118471] ? __might_sleep+0x95/0x190 [ 692.122473] __alloc_pages_nodemask+0x617/0x750 [ 692.127171] ? __alloc_pages_slowpath+0x2870/0x2870 [ 692.132315] ? fs_reclaim_acquire+0x20/0x20 [ 692.136664] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.142234] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 692.144762] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 692.147960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:10:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffa000/0x4000)=nil) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 692.147983] alloc_pages_current+0x107/0x210 [ 692.148005] ion_page_pool_alloc+0x17f/0x270 [ 692.161264] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 692.163329] ion_system_heap_allocate+0x154/0xa90 [ 692.163356] ? ion_system_heap_free+0x250/0x250 [ 692.163376] ? ion_alloc+0x306/0x900 [ 692.163396] ion_alloc+0x29b/0x900 [ 692.190176] ? ion_dma_buf_release+0x50/0x50 [ 692.194723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.200294] ? _copy_from_user+0xdd/0x150 [ 692.204539] ion_ioctl+0x17b/0x329 [ 692.208104] ? ion_alloc.cold+0x28/0x28 [ 692.212147] ? __might_sleep+0x95/0x190 [ 692.216141] ? ion_alloc.cold+0x28/0x28 [ 692.220138] do_vfs_ioctl+0xd5f/0x1380 [ 692.224050] ? selinux_file_ioctl+0x46c/0x5d0 [ 692.228563] ? selinux_file_ioctl+0x125/0x5d0 [ 692.233094] ? ioctl_preallocate+0x210/0x210 [ 692.237547] ? selinux_file_mprotect+0x620/0x620 [ 692.242315] ? iterate_fd+0x360/0x360 [ 692.246131] ? nsecs_to_jiffies+0x30/0x30 [ 692.250348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.255908] ? security_file_ioctl+0x8d/0xc0 [ 692.260338] ksys_ioctl+0xab/0xd0 [ 692.263820] __x64_sys_ioctl+0x73/0xb0 [ 692.267857] do_syscall_64+0xfd/0x620 [ 692.271671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.276873] RIP: 0033:0x45b399 [ 692.280239] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.299259] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.306983] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 692.314268] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 692.321667] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 692.328961] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 692.336246] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 692.345343] CPU: 0 PID: 8475 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 692.353180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.362552] Call Trace: [ 692.365167] dump_stack+0x197/0x210 [ 692.368816] warn_alloc.cold+0x7b/0x173 [ 692.372931] ? zone_watermark_ok_safe+0x260/0x260 [ 692.377801] ? __lock_is_held+0xb6/0x140 [ 692.381918] __alloc_pages_slowpath+0x2214/0x2870 [ 692.386813] ? warn_alloc+0x110/0x110 [ 692.390630] ? __lock_is_held+0xb6/0x140 [ 692.394714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.397116] warn_alloc_show_mem: 2 callbacks suppressed [ 692.397121] Mem-Info: [ 692.400312] ? should_fail+0x14d/0x85c [ 692.400340] ? __isolate_free_page+0x4c0/0x4c0 [ 692.400361] ? __might_sleep+0x95/0x190 [ 692.400381] __alloc_pages_nodemask+0x617/0x750 [ 692.400401] ? __alloc_pages_slowpath+0x2870/0x2870 [ 692.400423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.410844] active_anon:331074 inactive_anon:208 isolated_anon:36 [ 692.410844] active_file:2120 inactive_file:1740 isolated_file:11 [ 692.410844] unevictable:0 dirty:105 writeback:0 unstable:0 [ 692.410844] slab_reclaimable:15601 slab_unreclaimable:116260 [ 692.410844] mapped:55148 shmem:397 pagetables:4642 bounce:0 [ 692.410844] free:916794 free_pcp:400 free_cma:0 [ 692.412101] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 692.412117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.412138] alloc_pages_current+0x107/0x210 [ 692.421667] Node 0 active_anon:1324048kB inactive_anon:816kB active_file:6232kB inactive_file:4680kB unevictable:0kB isolated(anon):144kB isolated(file):44kB mapped:217364kB dirty:392kB writeback:0kB shmem:1572kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 591872kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 692.425383] ion_page_pool_alloc+0x17f/0x270 [ 692.425404] ion_system_heap_allocate+0x154/0xa90 [ 692.425427] ? ion_system_heap_free+0x250/0x250 [ 692.425446] ? ion_alloc+0x306/0x900 [ 692.425465] ion_alloc+0x29b/0x900 [ 692.425490] ? ion_dma_buf_release+0x50/0x50 [ 692.425514] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.425528] ? _copy_from_user+0xdd/0x150 [ 692.425547] ion_ioctl+0x17b/0x329 [ 692.435975] Node 0 DMA free:10456kB min:220kB low:272kB high:324kB active_anon:8kB inactive_anon:4kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:48kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 692.436128] ? ion_alloc.cold+0x28/0x28 [ 692.484695] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 692.485827] ? __might_sleep+0x95/0x190 [ 692.485850] ? ion_alloc.cold+0x28/0x28 [ 692.596708] do_vfs_ioctl+0xd5f/0x1380 [ 692.597707] Node 0 DMA32 free:63940kB min:36168kB low:45208kB high:54248kB active_anon:1324136kB inactive_anon:812kB active_file:5976kB inactive_file:4620kB unevictable:0kB writepending:396kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12128kB pagetables:18404kB bounce:0kB free_pcp:2512kB local_pcp:1244kB free_cma:0kB [ 692.600618] ? selinux_file_ioctl+0x46c/0x5d0 [ 692.600636] ? selinux_file_ioctl+0x125/0x5d0 [ 692.600654] ? ioctl_preallocate+0x210/0x210 [ 692.643849] ? selinux_file_mprotect+0x620/0x620 [ 692.648646] ? iterate_fd+0x360/0x360 [ 692.652468] ? nsecs_to_jiffies+0x30/0x30 [ 692.656646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.662213] ? security_file_ioctl+0x8d/0xc0 [ 692.666641] ksys_ioctl+0xab/0xd0 [ 692.670109] __x64_sys_ioctl+0x73/0xb0 [ 692.674017] do_syscall_64+0xfd/0x620 [ 692.677858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.683068] RIP: 0033:0x45b399 [ 692.686275] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.705327] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.713061] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 692.720351] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 692.727639] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 692.735062] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 692.742351] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 692.749652] CPU: 1 PID: 8487 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 692.757483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.766857] Call Trace: [ 692.769483] dump_stack+0x197/0x210 [ 692.773139] warn_alloc.cold+0x7b/0x173 [ 692.777139] ? zone_watermark_ok_safe+0x260/0x260 [ 692.782006] ? compaction_deferred+0x16a/0x3b0 [ 692.786619] ? try_to_compact_pages+0x44/0xae0 [ 692.791249] __alloc_pages_slowpath+0x2214/0x2870 [ 692.796193] ? warn_alloc+0x110/0x110 [ 692.800020] ? __lock_is_held+0xb6/0x140 [ 692.804108] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.809663] ? should_fail+0x14d/0x85c [ 692.813618] ? __isolate_free_page+0x4c0/0x4c0 [ 692.818390] ? __might_sleep+0x95/0x190 [ 692.822475] __alloc_pages_nodemask+0x617/0x750 [ 692.827180] ? __alloc_pages_slowpath+0x2870/0x2870 [ 692.832240] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.837826] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 692.843541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.849098] alloc_pages_current+0x107/0x210 [ 692.853508] ion_page_pool_alloc+0x17f/0x270 [ 692.857932] ion_system_heap_allocate+0x154/0xa90 [ 692.862785] ? ion_system_heap_free+0x250/0x250 [ 692.867466] ? ion_alloc+0x306/0x900 [ 692.871194] ion_alloc+0x29b/0x900 [ 692.874764] ? ion_dma_buf_release+0x50/0x50 [ 692.879191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.884731] ? _copy_from_user+0xdd/0x150 [ 692.888989] ion_ioctl+0x17b/0x329 [ 692.892578] ? ion_alloc.cold+0x28/0x28 [ 692.896552] ? __might_sleep+0x95/0x190 [ 692.900541] ? ion_alloc.cold+0x28/0x28 [ 692.904533] do_vfs_ioctl+0xd5f/0x1380 [ 692.908447] ? selinux_file_ioctl+0x46c/0x5d0 [ 692.912955] ? selinux_file_ioctl+0x125/0x5d0 [ 692.917451] ? ioctl_preallocate+0x210/0x210 [ 692.921880] ? selinux_file_mprotect+0x620/0x620 [ 692.926646] ? iterate_fd+0x360/0x360 [ 692.930444] ? nsecs_to_jiffies+0x30/0x30 [ 692.934593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.941181] ? security_file_ioctl+0x8d/0xc0 [ 692.945774] ksys_ioctl+0xab/0xd0 [ 692.949225] __x64_sys_ioctl+0x73/0xb0 [ 692.953126] do_syscall_64+0xfd/0x620 [ 692.956945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.962231] RIP: 0033:0x45b399 [ 692.965424] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.984329] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.992055] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 692.999319] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 20:10:06 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 693.006577] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 693.013833] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 693.021092] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 693.036728] lowmem_reserve[]: 0 0 1 1 1 20:10:06 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) socket(0x2, 0x1000000000000002, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x88a8ffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 693.042482] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 693.152530] lowmem_reserve[]: 0 0 0 0 0 [ 693.165507] Node 0 DMA: 3*4kB (UM) 4*8kB (UME) 7*16kB (UME) 5*32kB (UME) 3*64kB (UME) 2*128kB (ME) 4*256kB (UME) 5*512kB (UME) 4*1024kB (UME) 1*2048kB (E) 0*4096kB = 10492kB 20:10:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0x9effffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 693.313278] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 693.342374] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 693.352803] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 693.361962] CPU: 0 PID: 8724 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 693.369795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.372754] Node 0 DMA32: 1476*4kB (UME) 1221*8kB (UME) 825*16kB (UME) 926*32kB (UME) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 58568kB [ 693.379151] Call Trace: [ 693.379174] dump_stack+0x197/0x210 [ 693.379196] warn_alloc.cold+0x7b/0x173 [ 693.403590] ? zone_watermark_ok_safe+0x260/0x260 [ 693.408455] ? __lock_is_held+0xb6/0x140 [ 693.412557] __alloc_pages_slowpath+0x2214/0x2870 [ 693.417522] ? warn_alloc+0x110/0x110 [ 693.419978] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 693.421330] ? __lock_is_held+0xb6/0x140 [ 693.421349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.421367] ? should_fail+0x14d/0x85c [ 693.440184] ? __isolate_free_page+0x4c0/0x4c0 [ 693.444780] ? __might_sleep+0x95/0x190 [ 693.448761] __alloc_pages_nodemask+0x617/0x750 [ 693.453443] ? __alloc_pages_slowpath+0x2870/0x2870 [ 693.458481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.464036] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 693.469437] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 693.469753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.469774] alloc_pages_current+0x107/0x210 [ 693.490354] ion_page_pool_alloc+0x17f/0x270 [ 693.494781] ion_system_heap_allocate+0x154/0xa90 [ 693.499722] ? ion_system_heap_free+0x250/0x250 [ 693.500852] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 693.504400] ? ion_alloc+0x306/0x900 [ 693.504419] ion_alloc+0x29b/0x900 [ 693.504443] ? ion_dma_buf_release+0x50/0x50 [ 693.504469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.504485] ? _copy_from_user+0xdd/0x150 [ 693.504501] ion_ioctl+0x17b/0x329 [ 693.504519] ? ion_alloc.cold+0x28/0x28 [ 693.537340] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 693.538155] ? __might_sleep+0x95/0x190 [ 693.547645] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 693.550682] ? ion_alloc.cold+0x28/0x28 [ 693.550703] do_vfs_ioctl+0xd5f/0x1380 [ 693.570527] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 693.571336] ? selinux_file_ioctl+0x46c/0x5d0 [ 693.584391] ? selinux_file_ioctl+0x125/0x5d0 [ 693.588892] ? ioctl_preallocate+0x210/0x210 [ 693.593307] ? selinux_file_mprotect+0x620/0x620 [ 693.595130] 4200 total pagecache pages [ 693.598075] ? iterate_fd+0x360/0x360 [ 693.598091] ? nsecs_to_jiffies+0x30/0x30 [ 693.598113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.610100] 0 pages in swap cache [ 693.615431] ? security_file_ioctl+0x8d/0xc0 [ 693.615451] ksys_ioctl+0xab/0xd0 [ 693.615470] __x64_sys_ioctl+0x73/0xb0 [ 693.615489] do_syscall_64+0xfd/0x620 [ 693.615510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.615521] RIP: 0033:0x45b399 [ 693.615537] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.615545] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 693.615558] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 693.615567] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 693.615574] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 693.615585] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 693.631237] Swap cache stats: add 0, delete 0, find 0/0 [ 693.634528] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 693.670374] warn_alloc_show_mem: 2 callbacks suppressed [ 693.670379] Mem-Info: [ 693.691357] CPU: 1 PID: 8719 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 693.709460] active_anon:330525 inactive_anon:208 isolated_anon:0 [ 693.709460] active_file:1956 inactive_file:1827 isolated_file:0 [ 693.709460] unevictable:0 dirty:111 writeback:0 unstable:0 [ 693.709460] slab_reclaimable:15602 slab_unreclaimable:116315 [ 693.709460] mapped:55059 shmem:397 pagetables:4541 bounce:0 [ 693.709460] free:853572 free_pcp:356 free_cma:0 [ 693.712173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.712179] Call Trace: [ 693.712202] dump_stack+0x197/0x210 [ 693.712226] warn_alloc.cold+0x7b/0x173 [ 693.712243] ? zone_watermark_ok_safe+0x260/0x260 [ 693.712259] ? compaction_deferred+0x16a/0x3b0 [ 693.712278] ? try_to_compact_pages+0x44/0xae0 [ 693.720535] Node 0 active_anon:1322020kB inactive_anon:828kB active_file:5576kB inactive_file:5028kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:217008kB dirty:416kB writeback:0kB shmem:1584kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 589824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 693.727872] __alloc_pages_slowpath+0x2214/0x2870 [ 693.727907] ? warn_alloc+0x110/0x110 [ 693.727921] ? __lock_is_held+0xb6/0x140 [ 693.727937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.727952] ? should_fail+0x14d/0x85c [ 693.727970] ? __isolate_free_page+0x4c0/0x4c0 [ 693.727991] ? __might_sleep+0x95/0x190 [ 693.728009] __alloc_pages_nodemask+0x617/0x750 [ 693.728030] ? __alloc_pages_slowpath+0x2870/0x2870 [ 693.728051] ? fs_reclaim_acquire+0x20/0x20 [ 693.728065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.728104] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 693.764544] Node 0 DMA free:10432kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 693.771118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.771141] alloc_pages_current+0x107/0x210 [ 693.771163] ion_page_pool_alloc+0x17f/0x270 [ 693.771181] ion_system_heap_allocate+0x154/0xa90 [ 693.771205] ? ion_system_heap_free+0x250/0x250 [ 693.771223] ? ion_alloc+0x306/0x900 [ 693.771242] ion_alloc+0x29b/0x900 [ 693.771267] ? ion_dma_buf_release+0x50/0x50 [ 693.771292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.771308] ? _copy_from_user+0xdd/0x150 [ 693.771327] ion_ioctl+0x17b/0x329 [ 693.771349] ? ion_alloc.cold+0x28/0x28 [ 693.775798] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 693.777560] ? __might_sleep+0x95/0x190 [ 693.777581] ? ion_alloc.cold+0x28/0x28 [ 693.777599] do_vfs_ioctl+0xd5f/0x1380 [ 693.777618] ? selinux_file_ioctl+0x46c/0x5d0 [ 693.777635] ? selinux_file_ioctl+0x125/0x5d0 [ 693.777652] ? ioctl_preallocate+0x210/0x210 [ 693.777670] ? selinux_file_mprotect+0x620/0x620 [ 693.777698] ? iterate_fd+0x360/0x360 [ 693.777718] ? nsecs_to_jiffies+0x30/0x30 [ 693.783543] Node 0 DMA32 free:61260kB min:36168kB low:45208kB high:54248kB active_anon:1322020kB inactive_anon:828kB active_file:5576kB inactive_file:4928kB unevictable:0kB writepending:416kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12096kB pagetables:18152kB bounce:0kB free_pcp:1480kB local_pcp:728kB free_cma:0kB [ 693.786538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.786556] ? security_file_ioctl+0x8d/0xc0 [ 693.786576] ksys_ioctl+0xab/0xd0 [ 693.786594] __x64_sys_ioctl+0x73/0xb0 [ 693.786613] do_syscall_64+0xfd/0x620 [ 693.786636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.786649] RIP: 0033:0x45b399 [ 693.786666] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.786678] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 693.791643] lowmem_reserve[]: 0 0 1 1 1 [ 693.795825] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 693.795834] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 693.795842] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 693.795851] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 693.795859] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 693.804603] Free swap = 0kB [ 693.830631] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 693.848118] Total swap = 0kB [ 693.868656] lowmem_reserve[]: 0 0 0 0 0 [ 693.938420] 1965979 pages RAM [ 694.066942] Node 0 DMA: 2*4kB (U) 3*8kB (UE) 6*16kB (UE) 4*32kB (UE) 1*64kB (E) 1*128kB (E) 3*256kB (UE) 4*512kB (UE) 3*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10432kB [ 694.086602] 0 pages HighMem/MovableOnly [ 694.149510] Node 0 DMA32: 1421*4kB (UME) 1319*8kB (UE) 794*16kB (UE) 934*32kB (UME) 1*64kB (M) 1*128kB (M) 1*256kB (U) 0*512kB 1*1024kB (M) 0*2048kB 0*4096kB = 60300kB [ 694.181058] 341741 pages reserved [ 694.212087] 0 pages cma reserved [ 694.240340] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 694.257768] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 694.268184] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 694.278897] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 20:10:07 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:07 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xb6060000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:07 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) r7 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r7) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r8, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r9, 0x5}, 0x1c}}, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r10, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r11, 0x5}, 0x1c}}, 0x0) kcmp$KCMP_EPOLL_TFD(r7, r2, 0x7, r8, &(0x7f00000000c0)={0xffffffffffffffff, r10, 0x8}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r12 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r13 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r13, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r12, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r12, 0x0, 0x8, &(0x7f0000000140)={r14, @remote, @loopback}, 0xc) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r6, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 694.289406] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 694.375715] 4510 total pagecache pages [ 694.391644] 0 pages in swap cache 20:10:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xc3ffffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 694.430700] Swap cache stats: add 0, delete 0, find 0/0 [ 694.467225] Free swap = 0kB [ 694.492498] Total swap = 0kB [ 694.502439] 1965979 pages RAM [ 694.505792] 0 pages HighMem/MovableOnly [ 694.515892] 341741 pages reserved [ 694.542884] 0 pages cma reserved [ 694.556256] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 694.556626] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 694.580052] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 694.614854] CPU: 1 PID: 8746 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 694.622758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.632169] Call Trace: [ 694.634938] dump_stack+0x197/0x210 [ 694.638614] warn_alloc.cold+0x7b/0x173 [ 694.642637] ? zone_watermark_ok_safe+0x260/0x260 [ 694.647508] ? __lock_is_held+0xb6/0x140 [ 694.651626] __alloc_pages_slowpath+0x2214/0x2870 [ 694.656529] ? warn_alloc+0x110/0x110 [ 694.660374] ? __lock_is_held+0xb6/0x140 [ 694.664472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 694.670066] ? should_fail+0x14d/0x85c [ 694.673995] ? __isolate_free_page+0x4c0/0x4c0 [ 694.678616] ? __might_sleep+0x95/0x190 [ 694.682634] __alloc_pages_nodemask+0x617/0x750 [ 694.687353] ? __alloc_pages_slowpath+0x2870/0x2870 [ 694.692419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 694.697992] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 694.703741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.709314] alloc_pages_current+0x107/0x210 [ 694.713767] ion_page_pool_alloc+0x17f/0x270 [ 694.718221] ion_system_heap_allocate+0x154/0xa90 [ 694.723101] ? ion_system_heap_free+0x250/0x250 [ 694.727797] ? ion_alloc+0x306/0x900 [ 694.731541] ion_alloc+0x29b/0x900 [ 694.735116] ? ion_dma_buf_release+0x50/0x50 [ 694.739553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 694.745109] ? _copy_from_user+0xdd/0x150 [ 694.749283] ion_ioctl+0x17b/0x329 [ 694.752856] ? ion_alloc.cold+0x28/0x28 [ 694.756873] ? __might_sleep+0x95/0x190 [ 694.760870] ? ion_alloc.cold+0x28/0x28 [ 694.764879] do_vfs_ioctl+0xd5f/0x1380 [ 694.768898] ? selinux_file_ioctl+0x46c/0x5d0 [ 694.773531] ? selinux_file_ioctl+0x125/0x5d0 [ 694.778069] ? ioctl_preallocate+0x210/0x210 [ 694.782528] ? selinux_file_mprotect+0x620/0x620 [ 694.787319] ? iterate_fd+0x360/0x360 [ 694.791184] ? nsecs_to_jiffies+0x30/0x30 [ 694.795503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.801080] ? security_file_ioctl+0x8d/0xc0 [ 694.805636] ksys_ioctl+0xab/0xd0 [ 694.809123] __x64_sys_ioctl+0x73/0xb0 [ 694.813049] do_syscall_64+0xfd/0x620 [ 694.816978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.822187] RIP: 0033:0x45b399 [ 694.825395] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 694.844428] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 694.852299] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 694.859693] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 694.867125] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 694.874436] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 694.881726] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:10:07 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) socket(0x2, 0x1000000000000002, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xf0ffffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 694.962288] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 694.968353] CPU: 0 PID: 8748 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 694.976175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.980961] warn_alloc_show_mem: 1 callbacks suppressed [ 694.980966] Mem-Info: [ 694.985536] Call Trace: [ 694.985564] dump_stack+0x197/0x210 [ 694.985587] warn_alloc.cold+0x7b/0x173 [ 694.985605] ? zone_watermark_ok_safe+0x260/0x260 [ 694.985621] ? __lock_is_held+0xb6/0x140 [ 694.985660] __alloc_pages_slowpath+0x2214/0x2870 [ 694.985694] ? warn_alloc+0x110/0x110 [ 694.985711] ? __lock_is_held+0xb6/0x140 [ 694.997093] active_anon:330524 inactive_anon:208 isolated_anon:0 [ 694.997093] active_file:2243 inactive_file:1921 isolated_file:0 [ 694.997093] unevictable:0 dirty:114 writeback:18 unstable:0 [ 694.997093] slab_reclaimable:15573 slab_unreclaimable:116394 [ 694.997093] mapped:55276 shmem:397 pagetables:4520 bounce:0 [ 694.997093] free:852436 free_pcp:434 free_cma:0 20:10:08 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 694.999714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.004017] Node 0 active_anon:1322084kB inactive_anon:832kB active_file:6724kB inactive_file:5404kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:217820kB dirty:428kB writeback:72kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 695.008533] ? should_fail+0x14d/0x85c [ 695.023461] Node 0 DMA free:10432kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 695.025294] ? __isolate_free_page+0x4c0/0x4c0 [ 695.068613] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 695.092879] ? __might_sleep+0x95/0x190 [ 695.092901] __alloc_pages_nodemask+0x617/0x750 [ 695.092921] ? __alloc_pages_slowpath+0x2870/0x2870 [ 695.092940] ? fs_reclaim_acquire+0x20/0x20 [ 695.092955] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.092972] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 695.092985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.093006] alloc_pages_current+0x107/0x210 [ 695.093028] ion_page_pool_alloc+0x17f/0x270 [ 695.093048] ion_system_heap_allocate+0x154/0xa90 [ 695.093071] ? ion_system_heap_free+0x250/0x250 [ 695.093086] ? ion_alloc+0x306/0x900 [ 695.093104] ion_alloc+0x29b/0x900 [ 695.093126] ? ion_dma_buf_release+0x50/0x50 [ 695.102902] Node 0 DMA32 free:58332kB min:36168kB low:45208kB high:54248kB active_anon:1322028kB inactive_anon:832kB active_file:6724kB inactive_file:5404kB unevictable:0kB writepending:548kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12096kB pagetables:18080kB bounce:0kB free_pcp:1788kB local_pcp:976kB free_cma:0kB [ 695.123170] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.123186] ? _copy_from_user+0xdd/0x150 [ 695.123206] ion_ioctl+0x17b/0x329 [ 695.123223] ? ion_alloc.cold+0x28/0x28 [ 695.123244] ? __might_sleep+0x95/0x190 [ 695.123262] ? ion_alloc.cold+0x28/0x28 [ 695.123280] do_vfs_ioctl+0xd5f/0x1380 [ 695.123297] ? selinux_file_ioctl+0x46c/0x5d0 [ 695.123314] ? selinux_file_ioctl+0x125/0x5d0 [ 695.123329] ? ioctl_preallocate+0x210/0x210 [ 695.123349] ? selinux_file_mprotect+0x620/0x620 [ 695.133388] lowmem_reserve[]: 0 0 1 1 1 [ 695.137062] ? iterate_fd+0x360/0x360 [ 695.145752] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 695.146750] ? nsecs_to_jiffies+0x30/0x30 [ 695.151050] lowmem_reserve[]: 0 0 0 0 0 [ 695.156608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.156627] ? security_file_ioctl+0x8d/0xc0 [ 695.156644] ksys_ioctl+0xab/0xd0 [ 695.156663] __x64_sys_ioctl+0x73/0xb0 [ 695.156680] do_syscall_64+0xfd/0x620 [ 695.156700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.156712] RIP: 0033:0x45b399 20:10:08 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r1, r2, 0x0, 0x10001) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f00000000c0)={0x7f, 0x9, 0x80}) r3 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r3, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r4 = getpid() rt_tgsigqueueinfo(0x0, r4, 0x0, 0x0) ptrace(0x10, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) r8 = dup3(r5, r6, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x10006, 0x0, 0x0, 0x7}, r4, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 695.156728] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 695.156736] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 695.167934] Node 0 DMA: 2*4kB (U) 3*8kB (UE) 6*16kB (UE) 4*32kB (UE) 1*64kB (E) 1*128kB (E) 3*256kB (UE) 4*512kB (UE) 3*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10432kB [ 695.168095] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 695.172784] Node 0 DMA32: 1381*4kB (UE) 1315*8kB (UE) 769*16kB (UE) 933*32kB (UME) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 58268kB 20:10:08 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 695.176910] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 695.176923] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 695.181756] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 695.186425] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 695.186434] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:10:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xfcffffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 695.658682] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 695.669454] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 695.712441] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 695.717883] CPU: 1 PID: 8988 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 695.725810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.735184] Call Trace: [ 695.737800] dump_stack+0x197/0x210 [ 695.741461] warn_alloc.cold+0x7b/0x173 [ 695.745464] ? zone_watermark_ok_safe+0x260/0x260 [ 695.750332] ? __lock_is_held+0xb6/0x140 [ 695.754445] __alloc_pages_slowpath+0x2214/0x2870 [ 695.759373] ? warn_alloc+0x110/0x110 [ 695.763202] ? __lock_is_held+0xb6/0x140 [ 695.767294] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.773010] ? should_fail+0x14d/0x85c [ 695.776490] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 695.777031] ? __isolate_free_page+0x4c0/0x4c0 [ 695.777061] ? __might_sleep+0x95/0x190 [ 695.777083] __alloc_pages_nodemask+0x617/0x750 [ 695.787034] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 695.790526] ? __alloc_pages_slowpath+0x2870/0x2870 [ 695.790550] ? fs_reclaim_acquire+0x20/0x20 [ 695.790567] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.790585] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 695.790598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.790618] alloc_pages_current+0x107/0x210 [ 695.790641] ion_page_pool_alloc+0x17f/0x270 [ 695.790662] ion_system_heap_allocate+0x154/0xa90 [ 695.790687] ? ion_system_heap_free+0x250/0x250 [ 695.790705] ? ion_alloc+0x306/0x900 [ 695.795422] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 695.799359] ion_alloc+0x29b/0x900 [ 695.799387] ? ion_dma_buf_release+0x50/0x50 [ 695.799412] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.799426] ? _copy_from_user+0xdd/0x150 [ 695.799452] ion_ioctl+0x17b/0x329 [ 695.799469] ? ion_alloc.cold+0x28/0x28 [ 695.799490] ? __might_sleep+0x95/0x190 [ 695.799509] ? ion_alloc.cold+0x28/0x28 [ 695.808685] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 695.813110] do_vfs_ioctl+0xd5f/0x1380 [ 695.813132] ? selinux_file_ioctl+0x46c/0x5d0 [ 695.813150] ? selinux_file_ioctl+0x125/0x5d0 [ 695.813166] ? ioctl_preallocate+0x210/0x210 [ 695.813182] ? selinux_file_mprotect+0x620/0x620 [ 695.813202] ? iterate_fd+0x360/0x360 [ 695.813219] ? nsecs_to_jiffies+0x30/0x30 [ 695.813240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.813256] ? security_file_ioctl+0x8d/0xc0 [ 695.813274] ksys_ioctl+0xab/0xd0 [ 695.818779] 4851 total pagecache pages [ 695.823260] __x64_sys_ioctl+0x73/0xb0 20:10:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xfeffffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 695.823281] do_syscall_64+0xfd/0x620 [ 695.823304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.823315] RIP: 0033:0x45b399 [ 695.823331] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 695.823338] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 695.823350] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 20:10:09 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xffffa888}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 695.823358] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 695.823366] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 695.823374] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 695.823382] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 695.968009] syz-executor.4 cpuset=syz4 mems_allowed=0-1 20:10:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x5}, 0x1c}}, 0x0) socket$inet6(0x10, 0x3, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r12, @ANYBLOB="b3a42107a30e558685d38d47435a8125ca76f9a28d995b7f64994c2cc2e6e7a93ceaa33513ea635a7edd016bf3bcec68a1d6dea7a6426c3c67dd6bf1c5cfc308f7e5b874650d85afca1dfb3001aa5d9015cc8205c0e12f105668475244c3306805686046495600f8e12a91f6ae4b4f6bd3796ae8970569c6c534474f134209279d2d0da82318d6a247f2fc03784124535486125655a6ae0749b81fd4e751dd98cc2771fddba12a51a2d2d0d08e834f94b687a73a6f0837e9fd0f9a0913943a34846390975c54947cb310a0cdfa84613ffc8fad3c8d0ad4", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca1bb372eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271c4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x74}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000240)={'batadv0\x00', 0x0}) r14 = socket$nl_generic(0x10, 0x3, 0x10) r15 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r14, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x1c, r15, 0x31905e13403123b7, 0x0, 0x0, {0xb, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r13}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r7, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r15, @ANYBLOB="010025bd0000ffdbdf25070000000546002900000000f31024fc4735661b638d36e7201598eb8c35d069c89728f8fe2cab050c92877b41de64f3af716588823807aaac6bd09f0d12a31d78"], 0x1c}, 0x1, 0x0, 0x0, 0x20008891}, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 696.302414] 0 pages in swap cache [ 696.306061] Swap cache stats: add 0, delete 0, find 0/0 [ 696.323049] CPU: 1 PID: 8916 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 696.331041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.340413] Call Trace: [ 696.343028] dump_stack+0x197/0x210 [ 696.346720] warn_alloc.cold+0x7b/0x173 [ 696.350824] ? zone_watermark_ok_safe+0x260/0x260 [ 696.355689] ? __lock_is_held+0xb6/0x140 [ 696.359801] __alloc_pages_slowpath+0x2214/0x2870 [ 696.364698] ? warn_alloc+0x110/0x110 [ 696.368531] ? __lock_is_held+0xb6/0x140 [ 696.372619] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.378179] ? should_fail+0x14d/0x85c [ 696.382097] ? __isolate_free_page+0x4c0/0x4c0 [ 696.386711] ? __might_sleep+0x95/0x190 [ 696.390825] __alloc_pages_nodemask+0x617/0x750 [ 696.395529] ? __alloc_pages_slowpath+0x2870/0x2870 [ 696.400580] ? fs_reclaim_acquire+0x20/0x20 [ 696.404974] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.410602] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 696.416340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.421910] alloc_pages_current+0x107/0x210 [ 696.426353] ion_page_pool_alloc+0x17f/0x270 [ 696.430799] ion_system_heap_allocate+0x154/0xa90 [ 696.435878] ? ion_system_heap_free+0x250/0x250 [ 696.440698] ? ion_alloc+0x306/0x900 [ 696.444636] ion_alloc+0x29b/0x900 [ 696.448586] ? ion_dma_buf_release+0x50/0x50 [ 696.453174] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.458847] ? _copy_from_user+0xdd/0x150 [ 696.463151] ion_ioctl+0x17b/0x329 [ 696.466732] ? ion_alloc.cold+0x28/0x28 [ 696.470818] ? __might_sleep+0x95/0x190 [ 696.474820] ? ion_alloc.cold+0x28/0x28 [ 696.478827] do_vfs_ioctl+0xd5f/0x1380 [ 696.482739] ? selinux_file_ioctl+0x46c/0x5d0 [ 696.487270] ? selinux_file_ioctl+0x125/0x5d0 [ 696.491816] ? ioctl_preallocate+0x210/0x210 [ 696.496251] ? selinux_file_mprotect+0x620/0x620 [ 696.501157] ? iterate_fd+0x360/0x360 [ 696.504991] ? nsecs_to_jiffies+0x30/0x30 [ 696.509272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.514832] ? security_file_ioctl+0x8d/0xc0 [ 696.519266] ksys_ioctl+0xab/0xd0 [ 696.522742] __x64_sys_ioctl+0x73/0xb0 [ 696.526651] do_syscall_64+0xfd/0x620 [ 696.530607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.535812] RIP: 0033:0x45b399 [ 696.539018] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.558033] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 696.565761] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 696.573054] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 696.580452] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 696.587742] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 696.595027] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 696.632303] Free swap = 0kB [ 696.635442] Total swap = 0kB [ 696.660181] 1965979 pages RAM [ 696.672308] 0 pages HighMem/MovableOnly [ 696.676455] 341741 pages reserved [ 696.692380] 0 pages cma reserved 20:10:09 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xfffff000}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 696.733336] warn_alloc_show_mem: 2 callbacks suppressed [ 696.733341] Mem-Info: [ 696.741376] active_anon:330532 inactive_anon:206 isolated_anon:0 [ 696.741376] active_file:2501 inactive_file:1961 isolated_file:12 [ 696.741376] unevictable:0 dirty:117 writeback:0 unstable:0 [ 696.741376] slab_reclaimable:15569 slab_unreclaimable:116724 [ 696.741376] mapped:55595 shmem:397 pagetables:4549 bounce:0 [ 696.741376] free:878413 free_pcp:317 free_cma:0 [ 696.842370] Node 0 active_anon:1322032kB inactive_anon:820kB active_file:6660kB inactive_file:5412kB unevictable:0kB isolated(anon):0kB isolated(file):48kB mapped:218804kB dirty:440kB writeback:0kB shmem:1576kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 696.919423] Node 0 DMA free:10588kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 696.968911] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 696.978838] Node 0 DMA32 free:120432kB min:36168kB low:45208kB high:54248kB active_anon:1324020kB inactive_anon:820kB active_file:6564kB inactive_file:5400kB unevictable:0kB writepending:440kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12064kB pagetables:18208kB bounce:0kB free_pcp:2312kB local_pcp:920kB free_cma:0kB [ 697.046781] lowmem_reserve[]: 0 0 1 1 1 [ 697.050904] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 697.077790] lowmem_reserve[]: 0 0 0 0 0 [ 697.082366] Node 0 DMA: 1*4kB (U) 2*8kB (UE) 5*16kB (UE) 4*32kB (UE) 2*64kB (UE) 1*128kB (E) 3*256kB (UE) 4*512kB (UE) 3*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10468kB [ 697.098266] Node 0 DMA32: 865*4kB (UME) 169*8kB (UME) 142*16kB (UME) 967*32kB (UE) 37*64kB (ME) 20*128kB (UME) 10*256kB (M) 0*512kB 9*1024kB (U) 2*2048kB (U) 0*4096kB = 58828kB [ 697.115007] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 697.127825] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 697.141035] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 697.154432] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 697.172587] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 697.181384] 4646 total pagecache pages [ 697.185974] 0 pages in swap cache [ 697.189817] Swap cache stats: add 0, delete 0, find 0/0 20:10:10 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) memfd_create(&(0x7f00000000c0)='TIPCv2\x00', 0x2) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:10:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xffffff7f}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:10 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:10 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:10 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 697.196030] Free swap = 0kB [ 697.199353] Total swap = 0kB [ 697.203343] 1965979 pages RAM [ 697.212126] 0 pages HighMem/MovableOnly [ 697.218110] 341741 pages reserved [ 697.222143] 0 pages cma reserved 20:10:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xffffff9e}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xffffffc3}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 697.600659] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 697.624203] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 697.638826] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 697.672995] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 697.673614] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 697.689935] CPU: 1 PID: 9153 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 697.697755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.707129] Call Trace: [ 697.709739] dump_stack+0x197/0x210 [ 697.713406] warn_alloc.cold+0x7b/0x173 [ 697.717415] ? zone_watermark_ok_safe+0x260/0x260 [ 697.722281] ? compaction_deferred+0x16a/0x3b0 [ 697.726886] ? try_to_compact_pages+0x44/0xae0 [ 697.731508] __alloc_pages_slowpath+0x2214/0x2870 [ 697.736399] ? warn_alloc+0x110/0x110 [ 697.740215] ? __lock_is_held+0xb6/0x140 [ 697.744306] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.749989] ? should_fail+0x14d/0x85c [ 697.753923] ? __isolate_free_page+0x4c0/0x4c0 [ 697.758542] ? __might_sleep+0x95/0x190 [ 697.762555] __alloc_pages_nodemask+0x617/0x750 [ 697.767262] ? __alloc_pages_slowpath+0x2870/0x2870 [ 697.772428] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.778000] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 697.783740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.789308] alloc_pages_current+0x107/0x210 [ 697.793748] ion_page_pool_alloc+0x17f/0x270 [ 697.798186] ion_system_heap_allocate+0x154/0xa90 [ 697.803065] ? ion_system_heap_free+0x250/0x250 [ 697.807760] ? ion_alloc+0x306/0x900 [ 697.811494] ion_alloc+0x29b/0x900 [ 697.815055] ? ion_dma_buf_release+0x50/0x50 [ 697.819487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.825037] ? _copy_from_user+0xdd/0x150 [ 697.829203] ion_ioctl+0x17b/0x329 [ 697.832765] ? ion_alloc.cold+0x28/0x28 [ 697.836758] ? __might_sleep+0x95/0x190 [ 697.840747] ? ion_alloc.cold+0x28/0x28 [ 697.844747] do_vfs_ioctl+0xd5f/0x1380 [ 697.848650] ? selinux_file_ioctl+0x46c/0x5d0 [ 697.853157] ? selinux_file_ioctl+0x125/0x5d0 [ 697.857671] ? ioctl_preallocate+0x210/0x210 [ 697.862094] ? selinux_file_mprotect+0x620/0x620 [ 697.866873] ? iterate_fd+0x360/0x360 [ 697.870713] ? nsecs_to_jiffies+0x30/0x30 [ 697.872480] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 697.874877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.874898] ? security_file_ioctl+0x8d/0xc0 [ 697.874919] ksys_ioctl+0xab/0xd0 [ 697.874936] __x64_sys_ioctl+0x73/0xb0 [ 697.874956] do_syscall_64+0xfd/0x620 [ 697.901395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.906596] RIP: 0033:0x45b399 [ 697.909898] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.928810] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 697.936539] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 697.943812] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 697.951089] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 697.958395] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 697.965670] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 697.972966] CPU: 0 PID: 9146 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 697.980783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.990147] Call Trace: [ 697.992756] dump_stack+0x197/0x210 [ 697.996401] warn_alloc.cold+0x7b/0x173 [ 698.000400] ? zone_watermark_ok_safe+0x260/0x260 [ 698.005258] ? compaction_deferred+0x16a/0x3b0 [ 698.009856] ? try_to_compact_pages+0x44/0xae0 [ 698.011912] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 698.014461] __alloc_pages_slowpath+0x2214/0x2870 [ 698.014498] ? warn_alloc+0x110/0x110 [ 698.014513] ? __lock_is_held+0xb6/0x140 [ 698.014533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.014550] ? should_fail+0x14d/0x85c [ 698.014570] ? __isolate_free_page+0x4c0/0x4c0 [ 698.014590] ? __might_sleep+0x95/0x190 [ 698.014608] __alloc_pages_nodemask+0x617/0x750 [ 698.014628] ? __alloc_pages_slowpath+0x2870/0x2870 [ 698.040027] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 698.042048] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.042071] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 698.076835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.082382] alloc_pages_current+0x107/0x210 [ 698.086802] ion_page_pool_alloc+0x17f/0x270 [ 698.091217] ion_system_heap_allocate+0x154/0xa90 [ 698.096059] ? ion_system_heap_free+0x250/0x250 [ 698.100746] ? ion_alloc+0x306/0x900 [ 698.104503] ion_alloc+0x29b/0x900 [ 698.108078] ? ion_dma_buf_release+0x50/0x50 [ 698.112506] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.118065] ? _copy_from_user+0xdd/0x150 [ 698.122231] ion_ioctl+0x17b/0x329 [ 698.125777] ? ion_alloc.cold+0x28/0x28 [ 698.129760] ? __might_sleep+0x95/0x190 [ 698.133728] ? ion_alloc.cold+0x28/0x28 [ 698.137699] do_vfs_ioctl+0xd5f/0x1380 [ 698.141598] ? selinux_file_ioctl+0x46c/0x5d0 [ 698.146086] ? selinux_file_ioctl+0x125/0x5d0 [ 698.150572] ? ioctl_preallocate+0x210/0x210 [ 698.154971] ? selinux_file_mprotect+0x620/0x620 [ 698.159721] ? iterate_fd+0x360/0x360 [ 698.163518] ? nsecs_to_jiffies+0x30/0x30 [ 698.167661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.173213] ? security_file_ioctl+0x8d/0xc0 [ 698.177626] ksys_ioctl+0xab/0xd0 [ 698.181082] __x64_sys_ioctl+0x73/0xb0 [ 698.184989] do_syscall_64+0xfd/0x620 [ 698.188799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.193987] RIP: 0033:0x45b399 [ 698.197196] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 698.216096] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 698.223795] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 698.231053] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 698.238314] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 698.245578] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 698.252937] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 698.262227] Mem-Info: [ 698.265659] CPU: 0 PID: 9141 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 698.273481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.282843] Call Trace: [ 698.285566] dump_stack+0x197/0x210 [ 698.289203] warn_alloc.cold+0x7b/0x173 [ 698.293193] ? zone_watermark_ok_safe+0x260/0x260 [ 698.298051] ? compaction_deferred+0x16a/0x3b0 [ 698.302647] ? try_to_compact_pages+0x44/0xae0 [ 698.307261] __alloc_pages_slowpath+0x2214/0x2870 [ 698.312251] ? warn_alloc+0x110/0x110 [ 698.316200] ? __lock_is_held+0xb6/0x140 [ 698.320353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.325908] ? should_fail+0x14d/0x85c [ 698.329800] ? __isolate_free_page+0x4c0/0x4c0 [ 698.334403] ? __might_sleep+0x95/0x190 [ 698.338396] __alloc_pages_nodemask+0x617/0x750 [ 698.343088] ? __alloc_pages_slowpath+0x2870/0x2870 [ 698.348111] ? fs_reclaim_acquire+0x20/0x20 [ 698.352446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.358003] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 698.363734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.369309] alloc_pages_current+0x107/0x210 [ 698.373738] ion_page_pool_alloc+0x17f/0x270 [ 698.378158] ion_system_heap_allocate+0x154/0xa90 [ 698.383020] ? ion_system_heap_free+0x250/0x250 [ 698.387730] ? ion_alloc+0x306/0x900 [ 698.391463] ion_alloc+0x29b/0x900 [ 698.395019] ? ion_dma_buf_release+0x50/0x50 [ 698.399443] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.405001] ? _copy_from_user+0xdd/0x150 [ 698.409165] ion_ioctl+0x17b/0x329 [ 698.412713] ? ion_alloc.cold+0x28/0x28 [ 698.416709] ? __might_sleep+0x95/0x190 [ 698.420719] ? ion_alloc.cold+0x28/0x28 [ 698.424703] do_vfs_ioctl+0xd5f/0x1380 [ 698.428606] ? selinux_file_ioctl+0x46c/0x5d0 [ 698.433100] ? selinux_file_ioctl+0x125/0x5d0 [ 698.437610] ? ioctl_preallocate+0x210/0x210 [ 698.442024] ? selinux_file_mprotect+0x620/0x620 [ 698.446819] ? iterate_fd+0x360/0x360 [ 698.450629] ? nsecs_to_jiffies+0x30/0x30 [ 698.454897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.460448] ? security_file_ioctl+0x8d/0xc0 [ 698.464876] ksys_ioctl+0xab/0xd0 [ 698.468345] __x64_sys_ioctl+0x73/0xb0 [ 698.472247] do_syscall_64+0xfd/0x620 [ 698.476069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.481263] RIP: 0033:0x45b399 [ 698.484476] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 698.503385] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 698.511108] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 698.518411] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 698.525694] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 698.532997] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 698.540283] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 698.547785] CPU: 0 PID: 9148 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 698.555710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.565084] Call Trace: [ 698.567692] dump_stack+0x197/0x210 [ 698.571354] warn_alloc.cold+0x7b/0x173 [ 698.575355] ? zone_watermark_ok_safe+0x260/0x260 [ 698.580222] ? compaction_deferred+0x16a/0x3b0 [ 698.584943] ? try_to_compact_pages+0x44/0xae0 [ 698.589572] __alloc_pages_slowpath+0x2214/0x2870 [ 698.594585] ? warn_alloc+0x110/0x110 [ 698.598400] ? __lock_is_held+0xb6/0x140 [ 698.602575] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.608120] ? should_fail+0x14d/0x85c [ 698.612023] ? __isolate_free_page+0x4c0/0x4c0 [ 698.616622] ? __might_sleep+0x95/0x190 [ 698.620612] __alloc_pages_nodemask+0x617/0x750 [ 698.625297] ? __alloc_pages_slowpath+0x2870/0x2870 [ 698.630328] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.635865] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 698.641584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.647139] alloc_pages_current+0x107/0x210 [ 698.651564] ion_page_pool_alloc+0x17f/0x270 [ 698.655981] ion_system_heap_allocate+0x154/0xa90 [ 698.660850] ? ion_system_heap_free+0x250/0x250 [ 698.665544] ? ion_alloc+0x306/0x900 [ 698.669276] ion_alloc+0x29b/0x900 [ 698.672830] ? ion_dma_buf_release+0x50/0x50 [ 698.677252] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.682801] ? _copy_from_user+0xdd/0x150 [ 698.686994] ion_ioctl+0x17b/0x329 [ 698.690539] ? ion_alloc.cold+0x28/0x28 [ 698.694526] ? __might_sleep+0x95/0x190 [ 698.698516] ? ion_alloc.cold+0x28/0x28 [ 698.702492] do_vfs_ioctl+0xd5f/0x1380 [ 698.706382] ? selinux_file_ioctl+0x46c/0x5d0 [ 698.710903] ? selinux_file_ioctl+0x125/0x5d0 [ 698.715418] ? ioctl_preallocate+0x210/0x210 [ 698.719831] ? selinux_file_mprotect+0x620/0x620 [ 698.724607] ? iterate_fd+0x360/0x360 [ 698.728408] ? nsecs_to_jiffies+0x30/0x30 [ 698.732572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.738127] ? security_file_ioctl+0x8d/0xc0 [ 698.742539] ksys_ioctl+0xab/0xd0 [ 698.746014] __x64_sys_ioctl+0x73/0xb0 [ 698.749919] do_syscall_64+0xfd/0x620 [ 698.753725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.758930] RIP: 0033:0x45b399 20:10:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xfffffff0}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 698.762127] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 698.781116] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 698.788852] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 698.796133] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 698.803411] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 698.810679] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 698.817959] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 698.829419] active_anon:332590 inactive_anon:208 isolated_anon:0 [ 698.829419] active_file:2196 inactive_file:1746 isolated_file:0 [ 698.829419] unevictable:0 dirty:51 writeback:23 unstable:0 [ 698.829419] slab_reclaimable:15514 slab_unreclaimable:116758 [ 698.829419] mapped:55177 shmem:397 pagetables:4578 bounce:0 [ 698.829419] free:933589 free_pcp:502 free_cma:0 [ 698.880019] Node 0 active_anon:1330348kB inactive_anon:828kB active_file:5540kB inactive_file:4360kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:216548kB dirty:176kB writeback:96kB shmem:1584kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 595968kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 698.928304] Node 0 DMA free:10404kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 698.958855] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 698.985354] Node 0 DMA32 free:37144kB min:36168kB low:45208kB high:54248kB active_anon:1330348kB inactive_anon:828kB active_file:5400kB inactive_file:3176kB unevictable:0kB writepending:272kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12128kB pagetables:18312kB bounce:0kB free_pcp:2680kB local_pcp:1336kB free_cma:0kB 20:10:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xfffffffc}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:12 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 699.055055] lowmem_reserve[]: 0 0 1 1 1 [ 699.074024] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 699.182344] lowmem_reserve[]: 0 0 0 0 0 [ 699.188929] Node 0 DMA: 2*4kB (U) 3*8kB (UE) 6*16kB (UE) 4*32kB (UE) 2*64kB (UE) 6*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10624kB 20:10:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xfffffffe}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) [ 699.217667] Node 0 DMA32: 1923*4kB (UME) 1533*8kB (UME) 326*16kB (UME) 842*32kB (UME) 273*64kB (UME) 60*128kB (UME) 26*256kB (UM) 10*512kB (U) 4*1024kB (U) 5*2048kB (UM) 0*4096kB = 103380kB [ 699.293170] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 699.312999] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 699.349031] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 699.358499] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 699.412305] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 699.425278] 4776 total pagecache pages [ 699.436282] 0 pages in swap cache [ 699.441337] Swap cache stats: add 0, delete 0, find 0/0 [ 699.447855] Free swap = 0kB [ 699.451780] Total swap = 0kB [ 699.455539] 1965979 pages RAM 20:10:12 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:12 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:12 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:12 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x0, 0xffffffff}, [@IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r5 = socket(0x5, 0xa, 0x0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x23, &(0x7f0000000080)={r8}, 0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000002940)={r8, 0x2, 0x4, 0x1}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYBLOB="8f0000dba3037730df8d4e804bf3a5100600747da1a77fec3bbee5e0279ad363a11353f050cd301ca96e229c82193f1ce0e8c8b99c51e6090be5c2142c42e1728b3890746dd5ded76c8bda5f3a34ca0d04e43b54f68152b1cc19fc7ea357645342ebdc5fa615b9d68923772b2dc65063b7a4a6cc0d52a9f77234a470234bf386187c67e0adfd8795fcff0e6c36b29bfd4d2a0e"], &(0x7f0000000300)=0x97) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r9, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r10, 0x5}, 0x1c}}, 0x0) r11 = dup3(r3, r9, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r11, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) r12 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) setsockopt$netrom_NETROM_N2(r12, 0x103, 0x3, &(0x7f0000000100), 0x4) [ 699.459453] 0 pages HighMem/MovableOnly [ 699.464475] 341741 pages reserved [ 699.468799] 0 pages cma reserved 20:10:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0x3, 0x1, @dev}]}, 0x2c}}, 0x0) [ 699.603456] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 699.616424] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 699.671879] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 699.675461] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 699.687601] syz-executor.4 cpuset=syz4 mems_allowed=0-1 20:10:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x2c}}, 0x0) [ 699.721142] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 699.724409] CPU: 1 PID: 9311 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 699.737593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.746966] Call Trace: [ 699.749736] dump_stack+0x197/0x210 [ 699.753396] warn_alloc.cold+0x7b/0x173 [ 699.757401] ? zone_watermark_ok_safe+0x260/0x260 [ 699.762272] ? compaction_deferred+0x16a/0x3b0 [ 699.766866] ? try_to_compact_pages+0x44/0xae0 [ 699.771472] __alloc_pages_slowpath+0x2214/0x2870 [ 699.776333] ? warn_alloc+0x110/0x110 [ 699.780147] ? __lock_is_held+0xb6/0x140 [ 699.784227] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 699.789788] ? should_fail+0x14d/0x85c [ 699.793732] ? __isolate_free_page+0x4c0/0x4c0 [ 699.798337] ? __might_sleep+0x95/0x190 [ 699.802315] __alloc_pages_nodemask+0x617/0x750 [ 699.807008] ? __alloc_pages_slowpath+0x2870/0x2870 [ 699.812048] ? fs_reclaim_acquire+0x20/0x20 [ 699.816393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 699.821957] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 699.827724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.833297] alloc_pages_current+0x107/0x210 [ 699.837761] ion_page_pool_alloc+0x17f/0x270 [ 699.842289] ion_system_heap_allocate+0x154/0xa90 [ 699.847163] ? ion_system_heap_free+0x250/0x250 [ 699.851849] ? ion_alloc+0x306/0x900 [ 699.857062] ion_alloc+0x29b/0x900 [ 699.860616] ? ion_dma_buf_release+0x50/0x50 [ 699.867040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 699.872950] ? _copy_from_user+0xdd/0x150 [ 699.877305] ion_ioctl+0x17b/0x329 [ 699.880880] ? ion_alloc.cold+0x28/0x28 [ 699.884877] ? __might_sleep+0x95/0x190 [ 699.888867] ? ion_alloc.cold+0x28/0x28 [ 699.892851] do_vfs_ioctl+0xd5f/0x1380 [ 699.896753] ? selinux_file_ioctl+0x46c/0x5d0 [ 699.901258] ? selinux_file_ioctl+0x125/0x5d0 [ 699.905770] ? ioctl_preallocate+0x210/0x210 [ 699.911246] ? selinux_file_mprotect+0x620/0x620 [ 699.916106] ? iterate_fd+0x360/0x360 [ 699.919907] ? nsecs_to_jiffies+0x30/0x30 [ 699.924146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.929795] ? security_file_ioctl+0x8d/0xc0 [ 699.934207] ksys_ioctl+0xab/0xd0 [ 699.937673] __x64_sys_ioctl+0x73/0xb0 [ 699.941573] do_syscall_64+0xfd/0x620 [ 699.945376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.950565] RIP: 0033:0x45b399 [ 699.953767] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.972775] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 699.980490] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 699.987775] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 699.995044] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 700.002320] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 700.009591] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 700.028282] CPU: 0 PID: 9315 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 700.036138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.043845] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 700.045507] Call Trace: [ 700.045535] dump_stack+0x197/0x210 [ 700.045556] warn_alloc.cold+0x7b/0x173 [ 700.045576] ? zone_watermark_ok_safe+0x260/0x260 [ 700.061207] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 700.063069] ? compaction_deferred+0x16a/0x3b0 [ 700.063090] ? try_to_compact_pages+0x44/0xae0 [ 700.063126] __alloc_pages_slowpath+0x2214/0x2870 [ 700.063158] ? warn_alloc+0x110/0x110 [ 700.063173] ? __lock_is_held+0xb6/0x140 [ 700.063193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.104684] ? should_fail+0x14d/0x85c [ 700.108573] ? __isolate_free_page+0x4c0/0x4c0 [ 700.113157] ? __might_sleep+0x95/0x190 [ 700.117152] __alloc_pages_nodemask+0x617/0x750 [ 700.121848] ? __alloc_pages_slowpath+0x2870/0x2870 [ 700.126872] ? fs_reclaim_acquire+0x20/0x20 [ 700.131303] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.136853] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 700.142595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.148171] alloc_pages_current+0x107/0x210 [ 700.152603] ion_page_pool_alloc+0x17f/0x270 [ 700.157028] ion_system_heap_allocate+0x154/0xa90 [ 700.161892] ? ion_system_heap_free+0x250/0x250 [ 700.166587] ? ion_alloc+0x306/0x900 [ 700.170327] ion_alloc+0x29b/0x900 [ 700.173896] ? ion_dma_buf_release+0x50/0x50 [ 700.178340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.183900] ? _copy_from_user+0xdd/0x150 [ 700.188083] ion_ioctl+0x17b/0x329 [ 700.191755] ? ion_alloc.cold+0x28/0x28 [ 700.195748] ? __might_sleep+0x95/0x190 [ 700.199727] ? ion_alloc.cold+0x28/0x28 [ 700.203727] do_vfs_ioctl+0xd5f/0x1380 [ 700.207637] ? selinux_file_ioctl+0x46c/0x5d0 [ 700.212145] ? selinux_file_ioctl+0x125/0x5d0 [ 700.216653] ? ioctl_preallocate+0x210/0x210 [ 700.221068] ? selinux_file_mprotect+0x620/0x620 [ 700.225845] ? iterate_fd+0x360/0x360 [ 700.229671] ? nsecs_to_jiffies+0x30/0x30 [ 700.233947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.239502] ? security_file_ioctl+0x8d/0xc0 [ 700.243931] ksys_ioctl+0xab/0xd0 [ 700.247412] __x64_sys_ioctl+0x73/0xb0 [ 700.251325] do_syscall_64+0xfd/0x620 [ 700.255258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.260560] RIP: 0033:0x45b399 [ 700.263772] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.282690] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 700.290424] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 700.297704] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 700.304983] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 700.312268] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 700.319572] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c 20:10:13 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) ptrace(0x10, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r4, 0x5}, 0x1c}}, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000380)={{0x4, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x10000001, 0xbd, 0x3f, 0x8001, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r1, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r7, @remote, @loopback}, 0xc) getsockopt$packet_int(r6, 0x107, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 700.326890] CPU: 1 PID: 9304 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 700.334711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.344079] Call Trace: [ 700.346715] dump_stack+0x197/0x210 [ 700.350380] warn_alloc.cold+0x7b/0x173 [ 700.354382] ? zone_watermark_ok_safe+0x260/0x260 [ 700.359250] ? __lock_is_held+0xb6/0x140 [ 700.363361] __alloc_pages_slowpath+0x2214/0x2870 [ 700.368248] ? warn_alloc+0x110/0x110 [ 700.372070] ? __lock_is_held+0xb6/0x140 [ 700.376170] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.381846] ? should_fail+0x14d/0x85c [ 700.385760] ? __isolate_free_page+0x4c0/0x4c0 [ 700.390119] warn_alloc_show_mem: 3 callbacks suppressed [ 700.390124] Mem-Info: [ 700.390360] ? __might_sleep+0x95/0x190 [ 700.390382] __alloc_pages_nodemask+0x617/0x750 [ 700.390402] ? __alloc_pages_slowpath+0x2870/0x2870 [ 700.395912] active_anon:331080 inactive_anon:206 isolated_anon:24 [ 700.395912] active_file:2933 inactive_file:1685 isolated_file:7 [ 700.395912] unevictable:0 dirty:73 writeback:30 unstable:0 [ 700.395912] slab_reclaimable:15519 slab_unreclaimable:117008 [ 700.395912] mapped:55490 shmem:397 pagetables:4644 bounce:0 [ 700.395912] free:936049 free_pcp:308 free_cma:0 [ 700.398185] ? fs_reclaim_acquire+0x20/0x20 [ 700.398204] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.398221] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 700.398238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.402486] Node 0 active_anon:1324240kB inactive_anon:820kB active_file:7752kB inactive_file:2840kB unevictable:0kB isolated(anon):96kB isolated(file):28kB mapped:216100kB dirty:284kB writeback:96kB shmem:1580kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 589824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 700.406999] alloc_pages_current+0x107/0x210 [ 700.407022] ion_page_pool_alloc+0x17f/0x270 [ 700.407042] ion_system_heap_allocate+0x154/0xa90 [ 700.412163] Node 0 DMA free:10424kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 700.445850] ? ion_system_heap_free+0x250/0x250 [ 700.445870] ? ion_alloc+0x306/0x900 [ 700.445890] ion_alloc+0x29b/0x900 [ 700.445911] ? ion_dma_buf_release+0x50/0x50 [ 700.445934] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.450376] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 700.455802] ? _copy_from_user+0xdd/0x150 [ 700.455824] ion_ioctl+0x17b/0x329 [ 700.455842] ? ion_alloc.cold+0x28/0x28 [ 700.455864] ? __might_sleep+0x95/0x190 [ 700.455883] ? ion_alloc.cold+0x28/0x28 [ 700.461709] Node 0 DMA32 free:57492kB min:36168kB low:45208kB high:54248kB active_anon:1324440kB inactive_anon:820kB active_file:7404kB inactive_file:2748kB unevictable:0kB writepending:344kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12256kB pagetables:18580kB bounce:0kB free_pcp:1232kB local_pcp:788kB free_cma:0kB [ 700.467152] do_vfs_ioctl+0xd5f/0x1380 [ 700.467172] ? selinux_file_ioctl+0x46c/0x5d0 [ 700.467188] ? selinux_file_ioctl+0x125/0x5d0 [ 700.467205] ? ioctl_preallocate+0x210/0x210 [ 700.467219] ? selinux_file_mprotect+0x620/0x620 [ 700.467240] ? iterate_fd+0x360/0x360 [ 700.495801] lowmem_reserve[]: 0 0 1 1 1 [ 700.500056] ? nsecs_to_jiffies+0x30/0x30 [ 700.500080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.500100] ? security_file_ioctl+0x8d/0xc0 [ 700.500121] ksys_ioctl+0xab/0xd0 [ 700.504676] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 700.509465] __x64_sys_ioctl+0x73/0xb0 [ 700.509486] do_syscall_64+0xfd/0x620 [ 700.509508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.509525] RIP: 0033:0x45b399 [ 700.535918] lowmem_reserve[]: 0 0 0 0 0 [ 700.540416] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.540424] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 700.540440] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 700.540447] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 700.540459] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 700.544311] Node 0 DMA: 2*4kB (U) 3*8kB (UE) 6*16kB (UE) 4*32kB (UE) 1*64kB (E) 5*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10432kB [ 700.547714] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 20:10:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0x10, 0x1, @dev}]}, 0x2c}}, 0x0) [ 700.547729] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 700.823354] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 700.830116] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 20:10:13 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 700.891306] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 700.900426] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 700.900459] CPU: 1 PID: 9310 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 700.900468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.900473] Call Trace: [ 700.900495] dump_stack+0x197/0x210 [ 700.900519] warn_alloc.cold+0x7b/0x173 [ 700.900538] ? zone_watermark_ok_safe+0x260/0x260 [ 700.900633] ? __lock_is_held+0xb6/0x140 [ 700.900682] __alloc_pages_slowpath+0x2214/0x2870 [ 700.900717] ? warn_alloc+0x110/0x110 [ 700.900735] ? __lock_is_held+0xb6/0x140 [ 700.900754] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.900771] ? should_fail+0x14d/0x85c [ 700.900791] ? __isolate_free_page+0x4c0/0x4c0 [ 700.900814] ? __might_sleep+0x95/0x190 [ 700.900834] __alloc_pages_nodemask+0x617/0x750 [ 700.900856] ? __alloc_pages_slowpath+0x2870/0x2870 [ 700.900876] ? fs_reclaim_acquire+0x20/0x20 [ 700.900890] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.900909] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 700.900924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.900945] alloc_pages_current+0x107/0x210 [ 700.900975] ion_page_pool_alloc+0x17f/0x270 [ 700.900997] ion_system_heap_allocate+0x154/0xa90 [ 700.901020] ? ion_system_heap_free+0x250/0x250 [ 700.901039] ? ion_alloc+0x306/0x900 [ 700.901060] ion_alloc+0x29b/0x900 [ 700.901084] ? ion_dma_buf_release+0x50/0x50 [ 700.901109] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.901124] ? _copy_from_user+0xdd/0x150 [ 700.901145] ion_ioctl+0x17b/0x329 [ 700.901163] ? ion_alloc.cold+0x28/0x28 [ 700.901185] ? __might_sleep+0x95/0x190 [ 700.901202] ? ion_alloc.cold+0x28/0x28 [ 700.901220] do_vfs_ioctl+0xd5f/0x1380 [ 700.901239] ? selinux_file_ioctl+0x46c/0x5d0 [ 700.901255] ? selinux_file_ioctl+0x125/0x5d0 [ 700.901273] ? ioctl_preallocate+0x210/0x210 [ 700.901290] ? selinux_file_mprotect+0x620/0x620 [ 700.901313] ? iterate_fd+0x360/0x360 [ 700.901332] ? nsecs_to_jiffies+0x30/0x30 20:10:14 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 700.901355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.901372] ? security_file_ioctl+0x8d/0xc0 [ 700.901391] ksys_ioctl+0xab/0xd0 [ 700.901411] __x64_sys_ioctl+0x73/0xb0 [ 700.901430] do_syscall_64+0xfd/0x620 [ 700.901452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.901464] RIP: 0033:0x45b399 [ 700.901481] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.901490] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 700.901503] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 700.901517] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 700.901530] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 701.008640] Node 0 DMA32: 1487*4kB (UME) 1604*8kB (UME) 551*16kB (UE) 939*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 57644kB [ 701.009133] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 701.013681] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 701.018389] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 701.092163] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 701.162110] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 701.168975] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 701.171677] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 701.190457] CPU: 1 PID: 9436 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 701.192672] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 701.202286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.202293] Call Trace: [ 701.202318] dump_stack+0x197/0x210 [ 701.202340] warn_alloc.cold+0x7b/0x173 [ 701.202357] ? zone_watermark_ok_safe+0x260/0x260 [ 701.202373] ? compaction_deferred+0x16a/0x3b0 [ 701.202389] ? try_to_compact_pages+0x44/0xae0 [ 701.202418] __alloc_pages_slowpath+0x2214/0x2870 [ 701.202451] ? warn_alloc+0x110/0x110 [ 701.202464] ? __lock_is_held+0xb6/0x140 [ 701.202481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.202498] ? should_fail+0x14d/0x85c [ 701.202558] ? __isolate_free_page+0x4c0/0x4c0 [ 701.202621] ? __might_sleep+0x95/0x190 [ 701.212747] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 701.221307] __alloc_pages_nodemask+0x617/0x750 [ 701.221333] ? __alloc_pages_slowpath+0x2870/0x2870 [ 701.221351] ? fs_reclaim_acquire+0x20/0x20 [ 701.221366] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.221384] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 701.221398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.221417] alloc_pages_current+0x107/0x210 [ 701.221439] ion_page_pool_alloc+0x17f/0x270 [ 701.221461] ion_system_heap_allocate+0x154/0xa90 [ 701.221489] ? ion_system_heap_free+0x250/0x250 [ 701.232149] 4888 total pagecache pages [ 701.235740] ? ion_alloc+0x306/0x900 [ 701.235761] ion_alloc+0x29b/0x900 [ 701.235787] ? ion_dma_buf_release+0x50/0x50 [ 701.235811] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.235825] ? _copy_from_user+0xdd/0x150 [ 701.235843] ion_ioctl+0x17b/0x329 [ 701.235863] ? ion_alloc.cold+0x28/0x28 [ 701.235885] ? __might_sleep+0x95/0x190 [ 701.235901] ? ion_alloc.cold+0x28/0x28 [ 701.235918] do_vfs_ioctl+0xd5f/0x1380 [ 701.235937] ? selinux_file_ioctl+0x46c/0x5d0 [ 701.235954] ? selinux_file_ioctl+0x125/0x5d0 [ 701.235972] ? ioctl_preallocate+0x210/0x210 [ 701.288921] 0 pages in swap cache [ 701.290258] ? selinux_file_mprotect+0x620/0x620 [ 701.290284] ? iterate_fd+0x360/0x360 [ 701.290301] ? nsecs_to_jiffies+0x30/0x30 [ 701.290324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.290340] ? security_file_ioctl+0x8d/0xc0 [ 701.290357] ksys_ioctl+0xab/0xd0 [ 701.290375] __x64_sys_ioctl+0x73/0xb0 [ 701.297748] Swap cache stats: add 0, delete 0, find 0/0 [ 701.299819] do_syscall_64+0xfd/0x620 [ 701.299843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.299855] RIP: 0033:0x45b399 [ 701.299870] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.299878] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 701.299892] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 701.299901] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 701.299910] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 701.299919] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 701.299928] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 701.344333] warn_alloc_show_mem: 3 callbacks suppressed [ 701.344338] Mem-Info: [ 701.350591] Free swap = 0kB [ 701.385116] active_anon:331057 inactive_anon:205 isolated_anon:0 [ 701.385116] active_file:2453 inactive_file:1986 isolated_file:0 [ 701.385116] unevictable:0 dirty:17 writeback:20 unstable:0 [ 701.385116] slab_reclaimable:15535 slab_unreclaimable:117365 [ 701.385116] mapped:55461 shmem:397 pagetables:4571 bounce:0 [ 701.385116] free:935893 free_pcp:199 free_cma:0 [ 701.414782] Total swap = 0kB [ 701.547478] Node 0 active_anon:1324028kB inactive_anon:820kB active_file:4828kB inactive_file:4008kB unevictable:0kB isolated(anon):48kB isolated(file):0kB mapped:215032kB dirty:52kB writeback:0kB shmem:1588kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 589824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 701.558302] 1965979 pages RAM [ 701.576918] Node 0 DMA free:10452kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 701.624189] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 701.651552] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 701.668816] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 701.691609] CPU: 0 PID: 9542 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 701.699432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.704074] Node 0 DMA32 free:58904kB min:36168kB low:45208kB high:54248kB active_anon:1324128kB inactive_anon:832kB active_file:5368kB inactive_file:3452kB unevictable:0kB writepending:48kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12128kB pagetables:18208kB bounce:0kB free_pcp:732kB local_pcp:720kB free_cma:0kB [ 701.708802] Call Trace: [ 701.708829] dump_stack+0x197/0x210 [ 701.743619] lowmem_reserve[]: 0 0 1 1 1 [ 701.744533] warn_alloc.cold+0x7b/0x173 [ 701.748535] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 701.752535] ? zone_watermark_ok_safe+0x260/0x260 [ 701.752553] ? __lock_is_held+0xb6/0x140 [ 701.752588] __alloc_pages_slowpath+0x2214/0x2870 [ 701.752622] ? warn_alloc+0x110/0x110 [ 701.752637] ? __lock_is_held+0xb6/0x140 [ 701.752654] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.752670] ? should_fail+0x14d/0x85c [ 701.752689] ? __isolate_free_page+0x4c0/0x4c0 [ 701.752710] ? __might_sleep+0x95/0x190 [ 701.784502] lowmem_reserve[]: 0 0 0 0 0 [ 701.787461] __alloc_pages_nodemask+0x617/0x750 [ 701.795037] Node 0 DMA: 3*4kB (UE) 7*8kB (UE) 6*16kB (UE) 4*32kB (UE) 1*64kB (E) 5*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10468kB [ 701.796117] ? __alloc_pages_slowpath+0x2870/0x2870 [ 701.800157] Node 0 DMA32: 1665*4kB (UME) 1718*8kB (UME) 517*16kB (UME) 946*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 58948kB [ 701.805717] ? fs_reclaim_acquire+0x20/0x20 [ 701.805733] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.805751] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 701.805764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.805783] alloc_pages_current+0x107/0x210 [ 701.805805] ion_page_pool_alloc+0x17f/0x270 [ 701.805825] ion_system_heap_allocate+0x154/0xa90 [ 701.805845] ? ion_system_heap_free+0x250/0x250 [ 701.805865] ? ion_alloc+0x306/0x900 [ 701.815157] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 701.818420] ion_alloc+0x29b/0x900 [ 701.824326] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 701.827092] ? ion_dma_buf_release+0x50/0x50 [ 701.847985] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 701.860913] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.860930] ? _copy_from_user+0xdd/0x150 [ 701.860948] ion_ioctl+0x17b/0x329 [ 701.860966] ? ion_alloc.cold+0x28/0x28 [ 701.860986] ? __might_sleep+0x95/0x190 [ 701.861003] ? ion_alloc.cold+0x28/0x28 [ 701.861019] do_vfs_ioctl+0xd5f/0x1380 [ 701.861044] ? selinux_file_ioctl+0x46c/0x5d0 [ 701.870993] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 701.876605] ? selinux_file_ioctl+0x125/0x5d0 [ 701.876622] ? ioctl_preallocate+0x210/0x210 [ 701.876637] ? selinux_file_mprotect+0x620/0x620 [ 701.876658] ? iterate_fd+0x360/0x360 [ 701.876675] ? nsecs_to_jiffies+0x30/0x30 [ 701.876695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.876714] ? security_file_ioctl+0x8d/0xc0 [ 701.887622] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 701.891092] ksys_ioctl+0xab/0xd0 [ 701.896247] 4555 total pagecache pages [ 701.900634] __x64_sys_ioctl+0x73/0xb0 [ 701.909688] 0 pages HighMem/MovableOnly [ 701.915029] do_syscall_64+0xfd/0x620 [ 701.915051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.915062] RIP: 0033:0x45b399 [ 701.915078] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.915086] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 701.915099] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 701.915106] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 701.915119] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 701.918883] 0 pages in swap cache [ 701.927535] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 701.927549] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 702.014487] 341741 pages reserved [ 702.020042] Swap cache stats: add 0, delete 0, find 0/0 [ 702.055200] 0 pages cma reserved [ 702.071759] Free swap = 0kB [ 702.155911] Total swap = 0kB [ 702.159087] 1965979 pages RAM [ 702.163794] 0 pages HighMem/MovableOnly [ 702.167974] 341741 pages reserved [ 702.171854] 0 pages cma reserved 20:10:15 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0x25, 0x1, @dev}]}, 0x2c}}, 0x0) 20:10:15 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:15 executing program 3: r0 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={r2, @remote, @loopback}, 0xc) r3 = accept$ax25(r0, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000100)=0x401, 0x4) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r5, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r6 = getpid() rt_tgsigqueueinfo(0x0, r6, 0x0, 0x0) ptrace(0x10, r6) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r8, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r9, 0x5}, 0x1c}}, 0x0) r10 = dup3(r7, r8, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r10, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r6, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r4, 0x2, 0x0) 20:10:15 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 702.272358] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:10:15 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 702.352665] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:10:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x2, @dev}]}, 0x2c}}, 0x0) [ 702.553042] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 702.564815] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 702.567533] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 702.578778] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 702.599359] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 702.605067] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 702.615785] CPU: 1 PID: 9549 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 702.623632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.633008] Call Trace: [ 702.635615] dump_stack+0x197/0x210 [ 702.639281] warn_alloc.cold+0x7b/0x173 [ 702.643279] ? zone_watermark_ok_safe+0x260/0x260 [ 702.648150] ? __lock_is_held+0xb6/0x140 [ 702.652267] __alloc_pages_slowpath+0x2214/0x2870 [ 702.657162] ? warn_alloc+0x110/0x110 [ 702.660994] ? __lock_is_held+0xb6/0x140 [ 702.661548] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 702.665072] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 702.665089] ? should_fail+0x14d/0x85c [ 702.665109] ? __isolate_free_page+0x4c0/0x4c0 [ 702.665130] ? __might_sleep+0x95/0x190 [ 702.665153] __alloc_pages_nodemask+0x617/0x750 [ 702.665176] ? __alloc_pages_slowpath+0x2870/0x2870 [ 702.665197] ? retint_kernel+0x2d/0x2d [ 702.665216] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 702.707910] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 702.713643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.719198] alloc_pages_current+0x107/0x210 [ 702.723645] ion_page_pool_alloc+0x17f/0x270 [ 702.728087] ion_system_heap_allocate+0x154/0xa90 [ 702.732956] ? ion_system_heap_free+0x250/0x250 [ 702.737635] ? ion_alloc+0x306/0x900 [ 702.741359] ion_alloc+0x29b/0x900 [ 702.744922] ? ion_dma_buf_release+0x50/0x50 [ 702.749346] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 702.754896] ? _copy_from_user+0xdd/0x150 [ 702.759061] ion_ioctl+0x17b/0x329 [ 702.762632] ? ion_alloc.cold+0x28/0x28 [ 702.766633] ? __might_sleep+0x95/0x190 [ 702.770629] ? ion_alloc.cold+0x28/0x28 [ 702.774631] do_vfs_ioctl+0xd5f/0x1380 [ 702.778545] ? selinux_file_ioctl+0x46c/0x5d0 [ 702.783058] ? selinux_file_ioctl+0x125/0x5d0 [ 702.787573] ? ioctl_preallocate+0x210/0x210 [ 702.791990] ? selinux_file_mprotect+0x620/0x620 [ 702.796772] ? iterate_fd+0x360/0x360 [ 702.800592] ? nsecs_to_jiffies+0x30/0x30 [ 702.804765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.810320] ? security_file_ioctl+0x8d/0xc0 [ 702.814747] ksys_ioctl+0xab/0xd0 [ 702.818231] __x64_sys_ioctl+0x73/0xb0 [ 702.822137] do_syscall_64+0xfd/0x620 [ 702.825956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.831151] RIP: 0033:0x45b399 [ 702.834358] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 702.853278] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 702.861000] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 702.868275] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 702.875641] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 702.882960] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 702.890243] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 702.899031] CPU: 1 PID: 9554 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 702.906866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.916237] Call Trace: [ 702.918857] dump_stack+0x197/0x210 [ 702.922521] warn_alloc.cold+0x7b/0x173 [ 702.926532] ? zone_watermark_ok_safe+0x260/0x260 [ 702.931403] ? __lock_is_held+0xb6/0x140 [ 702.935540] __alloc_pages_slowpath+0x2214/0x2870 [ 702.940422] ? warn_alloc+0x110/0x110 [ 702.944243] ? __lock_is_held+0xb6/0x140 [ 702.948328] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 20:10:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r2, 0x5}, 0x1c}}, 0x0) r3 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000180)=0x60, 0x80000) dup3(r1, r3, 0x0) r4 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r4, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x1034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x1400, 0x3, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r5 = getpid() rt_tgsigqueueinfo(0x0, r5, 0x0, 0x0) ptrace(0x10, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x5}, 0x1c}}, 0x0) r9 = dup3(r6, r7, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r9, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x20208, 0x800027b}, r5, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 702.953893] ? should_fail+0x14d/0x85c [ 702.957802] ? __isolate_free_page+0x4c0/0x4c0 [ 702.962410] ? __might_sleep+0x95/0x190 [ 702.966411] __alloc_pages_nodemask+0x617/0x750 [ 702.971109] ? __alloc_pages_slowpath+0x2870/0x2870 [ 702.976146] ? fs_reclaim_acquire+0x20/0x20 [ 702.980472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 702.986028] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 702.991756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.997297] alloc_pages_current+0x107/0x210 [ 703.001708] ion_page_pool_alloc+0x17f/0x270 [ 703.006118] ion_system_heap_allocate+0x154/0xa90 [ 703.010966] ? ion_system_heap_free+0x250/0x250 [ 703.015636] ? ion_alloc+0x306/0x900 [ 703.019351] ion_alloc+0x29b/0x900 [ 703.022905] ? ion_dma_buf_release+0x50/0x50 [ 703.027342] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 703.032892] ? _copy_from_user+0xdd/0x150 [ 703.037038] ion_ioctl+0x17b/0x329 [ 703.040577] ? ion_alloc.cold+0x28/0x28 [ 703.044552] ? __might_sleep+0x95/0x190 [ 703.048522] ? ion_alloc.cold+0x28/0x28 [ 703.052503] do_vfs_ioctl+0xd5f/0x1380 [ 703.056397] ? selinux_file_ioctl+0x46c/0x5d0 [ 703.060893] ? selinux_file_ioctl+0x125/0x5d0 [ 703.065393] ? ioctl_preallocate+0x210/0x210 [ 703.069800] ? selinux_file_mprotect+0x620/0x620 [ 703.074569] ? iterate_fd+0x360/0x360 [ 703.078391] ? nsecs_to_jiffies+0x30/0x30 [ 703.082561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.088112] ? security_file_ioctl+0x8d/0xc0 [ 703.092534] ksys_ioctl+0xab/0xd0 [ 703.096000] __x64_sys_ioctl+0x73/0xb0 [ 703.099887] do_syscall_64+0xfd/0x620 [ 703.103711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.108903] RIP: 0033:0x45b399 [ 703.112094] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.131017] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 703.138747] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 703.146032] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 703.153318] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 703.160597] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 703.167883] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 703.175179] CPU: 0 PID: 9562 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 703.182999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.183178] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 703.192364] Call Trace: [ 703.192388] dump_stack+0x197/0x210 [ 703.192411] warn_alloc.cold+0x7b/0x173 [ 703.192428] ? zone_watermark_ok_safe+0x260/0x260 [ 703.192444] ? compaction_deferred+0x16a/0x3b0 [ 703.192462] ? try_to_compact_pages+0x44/0xae0 [ 703.192492] __alloc_pages_slowpath+0x2214/0x2870 [ 703.226802] ? warn_alloc+0x110/0x110 [ 703.230612] ? __lock_is_held+0xb6/0x140 [ 703.234689] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 703.240246] ? should_fail+0x14d/0x85c [ 703.244138] ? __isolate_free_page+0x4c0/0x4c0 [ 703.248726] ? __might_sleep+0x95/0x190 [ 703.252817] __alloc_pages_nodemask+0x617/0x750 [ 703.257487] ? __alloc_pages_slowpath+0x2870/0x2870 [ 703.262524] ? fs_reclaim_acquire+0x20/0x20 [ 703.266854] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 703.272412] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 703.278123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.283660] alloc_pages_current+0x107/0x210 [ 703.288092] ion_page_pool_alloc+0x17f/0x270 [ 703.292505] ion_system_heap_allocate+0x154/0xa90 [ 703.297353] ? ion_system_heap_free+0x250/0x250 [ 703.302054] ? ion_alloc+0x306/0x900 [ 703.305770] ion_alloc+0x29b/0x900 [ 703.309314] ? ion_dma_buf_release+0x50/0x50 [ 703.313733] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 703.319421] ? _copy_from_user+0xdd/0x150 [ 703.323580] ion_ioctl+0x17b/0x329 [ 703.327123] ? ion_alloc.cold+0x28/0x28 [ 703.331101] ? __might_sleep+0x95/0x190 [ 703.335075] ? ion_alloc.cold+0x28/0x28 [ 703.339049] do_vfs_ioctl+0xd5f/0x1380 [ 703.342948] ? selinux_file_ioctl+0x46c/0x5d0 [ 703.347440] ? selinux_file_ioctl+0x125/0x5d0 [ 703.351929] ? ioctl_preallocate+0x210/0x210 [ 703.356330] ? selinux_file_mprotect+0x620/0x620 [ 703.361085] ? iterate_fd+0x360/0x360 [ 703.364882] ? nsecs_to_jiffies+0x30/0x30 [ 703.369031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.374563] ? security_file_ioctl+0x8d/0xc0 [ 703.378995] ksys_ioctl+0xab/0xd0 [ 703.382462] __x64_sys_ioctl+0x73/0xb0 [ 703.386364] do_syscall_64+0xfd/0x620 [ 703.390171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.395353] RIP: 0033:0x45b399 [ 703.398539] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.417428] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 703.425661] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 703.432921] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 703.440183] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 703.447445] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 703.454714] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 703.462002] CPU: 1 PID: 9557 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 703.469827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.479198] Call Trace: [ 703.481816] dump_stack+0x197/0x210 [ 703.485475] warn_alloc.cold+0x7b/0x173 [ 703.489472] ? zone_watermark_ok_safe+0x260/0x260 [ 703.494337] ? __lock_is_held+0xb6/0x140 [ 703.498970] __alloc_pages_slowpath+0x2214/0x2870 [ 703.503862] ? warn_alloc+0x110/0x110 [ 703.505096] warn_alloc_show_mem: 1 callbacks suppressed [ 703.505101] Mem-Info: [ 703.507673] ? __lock_is_held+0xb6/0x140 [ 703.507696] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 703.507714] ? should_fail+0x14d/0x85c [ 703.507734] ? __isolate_free_page+0x4c0/0x4c0 [ 703.507755] ? __might_sleep+0x95/0x190 [ 703.507777] __alloc_pages_nodemask+0x617/0x750 [ 703.507799] ? __alloc_pages_slowpath+0x2870/0x2870 [ 703.507822] ? fs_reclaim_acquire+0x20/0x20 [ 703.513859] active_anon:330556 inactive_anon:206 isolated_anon:18 [ 703.513859] active_file:2325 inactive_file:1892 isolated_file:0 [ 703.513859] unevictable:0 dirty:29 writeback:0 unstable:0 [ 703.513859] slab_reclaimable:15507 slab_unreclaimable:117283 [ 703.513859] mapped:55249 shmem:397 pagetables:4606 bounce:0 [ 703.513859] free:935459 free_pcp:306 free_cma:0 [ 703.515589] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 703.515611] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 703.515628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.515647] alloc_pages_current+0x107/0x210 [ 703.515669] ion_page_pool_alloc+0x17f/0x270 [ 703.515688] ion_system_heap_allocate+0x154/0xa90 [ 703.515714] ? ion_system_heap_free+0x250/0x250 [ 703.520723] Node 0 active_anon:1322224kB inactive_anon:820kB active_file:4692kB inactive_file:2808kB unevictable:0kB isolated(anon):72kB isolated(file):0kB mapped:213988kB dirty:104kB writeback:0kB shmem:1584kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 703.525303] ? ion_alloc+0x306/0x900 20:10:16 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 703.525325] ion_alloc+0x29b/0x900 [ 703.525350] ? ion_dma_buf_release+0x50/0x50 [ 703.525374] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 703.525388] ? _copy_from_user+0xdd/0x150 [ 703.525405] ion_ioctl+0x17b/0x329 [ 703.525422] ? ion_alloc.cold+0x28/0x28 [ 703.525444] ? __might_sleep+0x95/0x190 [ 703.525462] ? ion_alloc.cold+0x28/0x28 [ 703.525480] do_vfs_ioctl+0xd5f/0x1380 [ 703.525499] ? selinux_file_ioctl+0x46c/0x5d0 [ 703.525514] ? selinux_file_ioctl+0x125/0x5d0 [ 703.525533] ? ioctl_preallocate+0x210/0x210 20:10:16 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x3, @dev}]}, 0x2c}}, 0x0) [ 703.530104] Node 0 DMA free:10420kB min:220kB low:272kB high:324kB active_anon:40kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 703.534002] ? selinux_file_mprotect+0x620/0x620 [ 703.534028] ? iterate_fd+0x360/0x360 [ 703.534047] ? nsecs_to_jiffies+0x30/0x30 [ 703.534070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.534086] ? security_file_ioctl+0x8d/0xc0 [ 703.534103] ksys_ioctl+0xab/0xd0 [ 703.534120] __x64_sys_ioctl+0x73/0xb0 [ 703.534137] do_syscall_64+0xfd/0x620 [ 703.534157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.534172] RIP: 0033:0x45b399 [ 703.538964] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 703.542809] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.542819] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 703.542835] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 703.542844] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 703.542853] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 703.542862] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 703.542870] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 703.851690] Node 0 DMA32 free:55092kB min:36168kB low:45208kB high:54248kB active_anon:1322220kB inactive_anon:820kB active_file:5032kB inactive_file:3224kB unevictable:0kB writepending:208kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12288kB pagetables:18388kB bounce:0kB free_pcp:1324kB local_pcp:788kB free_cma:0kB [ 703.893456] lowmem_reserve[]: 0 0 1 1 1 [ 703.897567] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 703.924002] lowmem_reserve[]: 0 0 0 0 0 [ 703.928475] Node 0 DMA: 3*4kB (UE) 8*8kB (UE) 5*16kB (UE) 4*32kB (UE) 1*64kB (E) 5*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10460kB [ 703.946192] Node 0 DMA32: 812*4kB (UE) 1826*8kB (UE) 450*16kB (UE) 908*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 54112kB [ 703.962068] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 704.042435] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 704.072453] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 704.106385] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 704.147177] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 704.175815] 6745 total pagecache pages [ 704.179885] 0 pages in swap cache [ 704.188914] ªªªªª: renamed from macsec0 20:10:17 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 704.206119] Swap cache stats: add 0, delete 0, find 0/0 20:10:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket(0x4, 0x5, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r3 = getpid() rt_tgsigqueueinfo(0x0, r3, 0x0, 0x0) ptrace(0x10, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r4, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x42, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0x4}, 0x8000000200036158, 0x800027b}, r3, 0x4, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 704.242307] Free swap = 0kB [ 704.245521] Total swap = 0kB [ 704.254713] 1965979 pages RAM [ 704.269938] 0 pages HighMem/MovableOnly [ 704.300774] 341741 pages reserved [ 704.322340] 0 pages cma reserved 20:10:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x4, @dev}]}, 0x2c}}, 0x0) 20:10:17 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 704.534349] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 20:10:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x0, 0x0) ptrace(0x10, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r5, 0x5}, 0x1c}}, 0x0) r6 = dup3(r3, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000180)={{{@in=@local, @in6=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r2, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) [ 704.605220] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 20:10:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x8, @dev}]}, 0x2c}}, 0x0) 20:10:17 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:18 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x10, @dev}]}, 0x2c}}, 0x0) 20:10:18 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 705.253157] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 705.369606] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 705.372160] warn_alloc: 2 callbacks suppressed [ 705.372185] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 705.394816] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 705.395156] syz-executor.5: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 20:10:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x33, @dev}]}, 0x2c}}, 0x0) [ 705.457805] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 705.491304] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 705.502735] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 705.508954] CPU: 0 PID: 9903 Comm: syz-executor.1 Not tainted 4.19.101-syzkaller #0 [ 705.516779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.526151] Call Trace: [ 705.528770] dump_stack+0x197/0x210 [ 705.532428] warn_alloc.cold+0x7b/0x173 [ 705.536861] ? zone_watermark_ok_safe+0x260/0x260 [ 705.541726] ? compaction_deferred+0x16a/0x3b0 [ 705.546340] ? try_to_compact_pages+0x44/0xae0 [ 705.550981] __alloc_pages_slowpath+0x2214/0x2870 [ 705.555866] ? warn_alloc+0x110/0x110 [ 705.559685] ? __lock_is_held+0xb6/0x140 [ 705.563774] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 705.569334] ? should_fail+0x14d/0x85c [ 705.573245] ? __isolate_free_page+0x4c0/0x4c0 [ 705.577889] ? __might_sleep+0x95/0x190 [ 705.581886] __alloc_pages_nodemask+0x617/0x750 [ 705.586585] ? lockdep_hardirqs_on+0x415/0x5d0 [ 705.591192] ? __alloc_pages_slowpath+0x2870/0x2870 [ 705.596238] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 705.601803] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 705.607540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.613107] alloc_pages_current+0x107/0x210 [ 705.617548] ion_page_pool_alloc+0x17f/0x270 [ 705.621986] ion_system_heap_allocate+0x154/0xa90 [ 705.626866] ? ion_system_heap_free+0x250/0x250 [ 705.631559] ? ion_alloc+0x306/0x900 [ 705.635301] ion_alloc+0x29b/0x900 [ 705.638876] ? ion_dma_buf_release+0x50/0x50 [ 705.642330] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 705.643310] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 705.643331] ? _copy_from_user+0xdd/0x150 [ 705.648808] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 705.654253] ion_ioctl+0x17b/0x329 [ 705.654273] ? ion_alloc.cold+0x28/0x28 [ 705.654294] ? __might_sleep+0x95/0x190 [ 705.654311] ? ion_alloc.cold+0x28/0x28 [ 705.654326] do_vfs_ioctl+0xd5f/0x1380 [ 705.654347] ? selinux_file_ioctl+0x46c/0x5d0 [ 705.687629] ? selinux_file_ioctl+0x125/0x5d0 [ 705.692141] ? ioctl_preallocate+0x210/0x210 [ 705.696557] ? selinux_file_mprotect+0x620/0x620 [ 705.701413] ? iterate_fd+0x360/0x360 [ 705.705232] ? nsecs_to_jiffies+0x30/0x30 [ 705.709405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.714956] ? security_file_ioctl+0x8d/0xc0 [ 705.719366] ksys_ioctl+0xab/0xd0 [ 705.722821] __x64_sys_ioctl+0x73/0xb0 [ 705.726738] do_syscall_64+0xfd/0x620 [ 705.730552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.735757] RIP: 0033:0x45b399 [ 705.738961] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 705.757868] RSP: 002b:00007fc462fd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 705.765590] RAX: ffffffffffffffda RBX: 00007fc462fd36d4 RCX: 000000000045b399 [ 705.772895] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000005 [ 705.780180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 705.787469] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 705.794775] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 705.802070] CPU: 1 PID: 9917 Comm: syz-executor.4 Not tainted 4.19.101-syzkaller #0 [ 705.809978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.819347] Call Trace: [ 705.821961] dump_stack+0x197/0x210 [ 705.825620] warn_alloc.cold+0x7b/0x173 [ 705.829623] ? zone_watermark_ok_safe+0x260/0x260 [ 705.834491] ? __lock_is_held+0xb6/0x140 [ 705.838587] __alloc_pages_slowpath+0x2214/0x2870 [ 705.843461] ? warn_alloc+0x110/0x110 [ 705.847282] ? __lock_is_held+0xb6/0x140 [ 705.851368] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 705.856936] ? should_fail+0x14d/0x85c [ 705.860846] ? __isolate_free_page+0x4c0/0x4c0 [ 705.865449] ? __might_sleep+0x95/0x190 [ 705.869435] __alloc_pages_nodemask+0x617/0x750 [ 705.874130] ? __alloc_pages_slowpath+0x2870/0x2870 [ 705.879197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 705.884764] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 705.890497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.896056] alloc_pages_current+0x107/0x210 [ 705.900487] ion_page_pool_alloc+0x17f/0x270 [ 705.904919] ion_system_heap_allocate+0x154/0xa90 [ 705.909796] ? ion_system_heap_free+0x250/0x250 [ 705.914494] ? ion_alloc+0x306/0x900 [ 705.918245] ion_alloc+0x29b/0x900 [ 705.919230] netlink: 'syz-executor.0': attribute type 51 has an invalid length. [ 705.921815] ? ion_dma_buf_release+0x50/0x50 [ 705.921841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 705.938028] netlink: 'syz-executor.0': attribute type 51 has an invalid length. [ 705.939224] ? _copy_from_user+0xdd/0x150 [ 705.939247] ion_ioctl+0x17b/0x329 [ 705.954370] ? ion_alloc.cold+0x28/0x28 [ 705.958369] ? __might_sleep+0x95/0x190 [ 705.962350] ? ion_alloc.cold+0x28/0x28 [ 705.966334] do_vfs_ioctl+0xd5f/0x1380 [ 705.970243] ? selinux_file_ioctl+0x46c/0x5d0 [ 705.974767] ? selinux_file_ioctl+0x125/0x5d0 [ 705.979301] ? ioctl_preallocate+0x210/0x210 [ 705.983775] ? selinux_file_mprotect+0x620/0x620 [ 705.988566] ? iterate_fd+0x360/0x360 [ 705.992385] ? nsecs_to_jiffies+0x30/0x30 [ 705.996556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.002118] ? security_file_ioctl+0x8d/0xc0 [ 706.006549] ksys_ioctl+0xab/0xd0 [ 706.010026] __x64_sys_ioctl+0x73/0xb0 [ 706.013934] do_syscall_64+0xfd/0x620 [ 706.017738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.022923] RIP: 0033:0x45b399 [ 706.026113] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.045011] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 706.052715] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 706.059978] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 706.067242] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 706.074502] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 706.081762] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 706.089050] CPU: 0 PID: 10032 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 706.096959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.106323] Call Trace: [ 706.108929] dump_stack+0x197/0x210 [ 706.112711] warn_alloc.cold+0x7b/0x173 [ 706.116723] ? zone_watermark_ok_safe+0x260/0x260 [ 706.121603] ? compaction_deferred+0x16a/0x3b0 [ 706.126222] ? try_to_compact_pages+0x44/0xae0 [ 706.130853] __alloc_pages_slowpath+0x2214/0x2870 [ 706.135747] ? warn_alloc+0x110/0x110 [ 706.139571] ? __lock_is_held+0xb6/0x140 [ 706.143661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.149215] ? should_fail+0x14d/0x85c [ 706.153229] ? __isolate_free_page+0x4c0/0x4c0 [ 706.157834] ? __might_sleep+0x95/0x190 [ 706.161842] __alloc_pages_nodemask+0x617/0x750 [ 706.166546] ? __alloc_pages_slowpath+0x2870/0x2870 [ 706.171598] ? fs_reclaim_acquire+0x20/0x20 [ 706.175969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.181543] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 706.187388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.192946] alloc_pages_current+0x107/0x210 [ 706.197387] ion_page_pool_alloc+0x17f/0x270 [ 706.201828] ion_system_heap_allocate+0x154/0xa90 [ 706.206707] ? ion_system_heap_free+0x250/0x250 20:10:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x118, @dev}]}, 0x2c}}, 0x0) [ 706.211408] ? ion_alloc+0x306/0x900 [ 706.215143] ion_alloc+0x29b/0x900 [ 706.218711] ? ion_dma_buf_release+0x50/0x50 [ 706.223144] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.228698] ? _copy_from_user+0xdd/0x150 [ 706.232864] ion_ioctl+0x17b/0x329 [ 706.236406] ? ion_alloc.cold+0x28/0x28 [ 706.240400] ? __might_sleep+0x95/0x190 [ 706.244388] ? ion_alloc.cold+0x28/0x28 [ 706.248369] do_vfs_ioctl+0xd5f/0x1380 [ 706.252271] ? selinux_file_ioctl+0x46c/0x5d0 [ 706.256779] ? selinux_file_ioctl+0x125/0x5d0 [ 706.261292] ? ioctl_preallocate+0x210/0x210 [ 706.265718] ? selinux_file_mprotect+0x620/0x620 [ 706.270478] ? iterate_fd+0x360/0x360 [ 706.274281] ? nsecs_to_jiffies+0x30/0x30 [ 706.278458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.284008] ? security_file_ioctl+0x8d/0xc0 [ 706.288414] ksys_ioctl+0xab/0xd0 [ 706.291864] __x64_sys_ioctl+0x73/0xb0 [ 706.295754] do_syscall_64+0xfd/0x620 [ 706.299570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.304766] RIP: 0033:0x45b399 [ 706.307960] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.326860] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 706.334565] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 706.341850] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 706.342367] warn_alloc_show_mem: 3 callbacks suppressed [ 706.342371] Mem-Info: [ 706.349134] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 706.349144] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 706.349153] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 706.399372] CPU: 1 PID: 9956 Comm: syz-executor.5 Not tainted 4.19.101-syzkaller #0 [ 706.407393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.416761] Call Trace: [ 706.419385] dump_stack+0x197/0x210 [ 706.423046] warn_alloc.cold+0x7b/0x173 [ 706.427046] ? zone_watermark_ok_safe+0x260/0x260 [ 706.431914] ? __lock_is_held+0xb6/0x140 [ 706.436025] __alloc_pages_slowpath+0x2214/0x2870 [ 706.440923] ? warn_alloc+0x110/0x110 [ 706.444747] ? __lock_is_held+0xb6/0x140 [ 706.448838] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.454401] ? should_fail+0x14d/0x85c [ 706.458317] ? __isolate_free_page+0x4c0/0x4c0 [ 706.462927] ? __might_sleep+0x95/0x190 [ 706.466929] __alloc_pages_nodemask+0x617/0x750 [ 706.471625] ? __alloc_pages_slowpath+0x2870/0x2870 [ 706.476685] ? fs_reclaim_acquire+0x20/0x20 [ 706.481036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.486604] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 706.492336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.497895] alloc_pages_current+0x107/0x210 [ 706.502328] ion_page_pool_alloc+0x17f/0x270 [ 706.506769] ion_system_heap_allocate+0x154/0xa90 [ 706.511648] ? ion_system_heap_free+0x250/0x250 [ 706.516351] ? ion_alloc+0x306/0x900 [ 706.520095] ion_alloc+0x29b/0x900 [ 706.523676] ? ion_dma_buf_release+0x50/0x50 [ 706.528117] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.533696] ? _copy_from_user+0xdd/0x150 [ 706.537877] ion_ioctl+0x17b/0x329 [ 706.541441] ? ion_alloc.cold+0x28/0x28 [ 706.545567] ? __might_sleep+0x95/0x190 [ 706.549575] ? ion_alloc.cold+0x28/0x28 [ 706.553588] do_vfs_ioctl+0xd5f/0x1380 [ 706.557508] ? selinux_file_ioctl+0x46c/0x5d0 [ 706.562033] ? selinux_file_ioctl+0x125/0x5d0 [ 706.566557] ? ioctl_preallocate+0x210/0x210 [ 706.570990] ? selinux_file_mprotect+0x620/0x620 [ 706.575775] ? iterate_fd+0x360/0x360 [ 706.579600] ? nsecs_to_jiffies+0x30/0x30 [ 706.583779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.589334] ? security_file_ioctl+0x8d/0xc0 [ 706.593765] ksys_ioctl+0xab/0xd0 [ 706.597239] __x64_sys_ioctl+0x73/0xb0 [ 706.601146] do_syscall_64+0xfd/0x620 [ 706.604971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.610171] RIP: 0033:0x45b399 [ 706.613377] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.632291] RSP: 002b:00007fea5c8b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 706.640021] RAX: ffffffffffffffda RBX: 00007fea5c8b86d4 RCX: 000000000045b399 [ 706.647312] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000007 [ 706.654618] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:10:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='TIPC\x00') bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000100)=0x54) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r3 = getpid() rt_tgsigqueueinfo(0x0, r3, 0x0, 0x0) ptrace(0x10, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000800)={0x0, 0x56, 0x0}, 0x8091) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x5}, 0x1c}}, 0x0) r7 = dup3(r4, r5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r3, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:10:19 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:19 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 706.661928] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 706.669215] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 706.763701] active_anon:330610 inactive_anon:205 isolated_anon:0 [ 706.763701] active_file:2809 inactive_file:2865 isolated_file:32 [ 706.763701] unevictable:0 dirty:92 writeback:0 unstable:0 [ 706.763701] slab_reclaimable:15558 slab_unreclaimable:117367 [ 706.763701] mapped:56498 shmem:397 pagetables:4659 bounce:0 [ 706.763701] free:899718 free_pcp:392 free_cma:0 [ 706.864564] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 706.896025] Node 0 active_anon:1322416kB inactive_anon:816kB active_file:4832kB inactive_file:2060kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:213400kB dirty:292kB writeback:0kB shmem:1584kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 706.924917] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 706.930590] CPU: 1 PID: 10103 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 706.938491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.947857] Call Trace: [ 706.950461] dump_stack+0x197/0x210 [ 706.954111] warn_alloc.cold+0x7b/0x173 [ 706.958100] ? zone_watermark_ok_safe+0x260/0x260 [ 706.962958] ? __lock_is_held+0xb6/0x140 [ 706.967064] __alloc_pages_slowpath+0x2214/0x2870 [ 706.971947] ? warn_alloc+0x110/0x110 [ 706.975760] ? __lock_is_held+0xb6/0x140 [ 706.979841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.985397] ? should_fail+0x14d/0x85c [ 706.989313] ? __isolate_free_page+0x4c0/0x4c0 [ 706.993920] ? __might_sleep+0x95/0x190 [ 706.997919] __alloc_pages_nodemask+0x617/0x750 [ 707.002620] ? __alloc_pages_slowpath+0x2870/0x2870 [ 707.007668] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 707.013225] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 707.018954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.024526] alloc_pages_current+0x107/0x210 [ 707.028965] ion_page_pool_alloc+0x17f/0x270 [ 707.033399] ion_system_heap_allocate+0x154/0xa90 [ 707.038274] ? ion_system_heap_free+0x250/0x250 [ 707.042970] ? ion_alloc+0x306/0x900 [ 707.046716] ion_alloc+0x29b/0x900 [ 707.050300] ? ion_dma_buf_release+0x50/0x50 [ 707.054764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 707.060464] ? _copy_from_user+0xdd/0x150 [ 707.064634] ion_ioctl+0x17b/0x329 [ 707.068174] ? ion_alloc.cold+0x28/0x28 [ 707.072147] ? __might_sleep+0x95/0x190 [ 707.076123] ? ion_alloc.cold+0x28/0x28 [ 707.080121] do_vfs_ioctl+0xd5f/0x1380 [ 707.084005] ? selinux_file_ioctl+0x46c/0x5d0 [ 707.088489] ? selinux_file_ioctl+0x125/0x5d0 [ 707.092979] ? ioctl_preallocate+0x210/0x210 [ 707.097394] ? selinux_file_mprotect+0x620/0x620 [ 707.102152] ? iterate_fd+0x360/0x360 [ 707.105949] ? nsecs_to_jiffies+0x30/0x30 [ 707.110092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.115641] ? security_file_ioctl+0x8d/0xc0 [ 707.120055] ksys_ioctl+0xab/0xd0 [ 707.123514] __x64_sys_ioctl+0x73/0xb0 [ 707.127407] do_syscall_64+0xfd/0x620 [ 707.131230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.136433] RIP: 0033:0x45b399 [ 707.139639] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 707.158538] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 707.166247] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 707.173524] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 707.180797] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 707.188070] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 707.195335] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 707.205656] Node 0 DMA free:10404kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 707.232717] lowmem_reserve[]: 0 2545 2546 2546 2546 [ 707.238042] Node 0 DMA32 free:50760kB min:36168kB low:45208kB high:54248kB active_anon:1321960kB inactive_anon:816kB active_file:4972kB inactive_file:2076kB unevictable:0kB writepending:444kB present:3129332kB managed:2609736kB mlocked:0kB kernel_stack:12128kB pagetables:18440kB bounce:0kB free_pcp:1284kB local_pcp:564kB free_cma:0kB [ 707.268397] lowmem_reserve[]: 0 0 1 1 1 [ 707.273702] Node 0 Normal free:0kB min:12kB low:12kB high:12kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1140kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 707.321661] lowmem_reserve[]: 0 0 0 0 0 [ 707.326200] Node 0 DMA: 3*4kB (UE) 7*8kB (UE) 6*16kB (UE) 4*32kB (UE) 2*64kB (UE) 4*128kB (UE) 5*256kB (UE) 4*512kB (UE) 2*1024kB (UE) 2*2048kB (ME) 0*4096kB = 10404kB [ 707.342271] Node 0 DMA32: 479*4kB (UE) 136*8kB (UME) 236*16kB (UE) 932*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 36604kB [ 707.356309] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 707.369039] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 707.378720] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 707.387792] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 707.397378] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 707.406412] 5942 total pagecache pages [ 707.410571] 0 pages in swap cache [ 707.414934] Swap cache stats: add 0, delete 0, find 0/0 20:10:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @rand_addr="faaf87d73084eccfc060c7a7d49a8861"}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8400, 0x120) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r3, 0x5}, 0x1c}}, 0x0) write$binfmt_aout(r2, &(0x7f0000000840)={{0x107, 0xff, 0x5, 0x28a, 0x3c7, 0x4, 0x13c, 0x37}, "c82362379ed41bc0176938d06887890558e6b7bcafce739a06d218ced049eaddce6f181700a5d15d7b4778b0f0401c4d6da9fb9de3ce222c86017476afac8d6b332a60ac57f90623a4c54c43a5d8de359f0d1de350eda8f054040220bafef19a34eb2208c6cce6f5514b01b87f536f59908dc7ebe5f354c6e1b53933", [[], [], [], [], []]}, 0x59c) r4 = getpid() rt_tgsigqueueinfo(0x0, r4, 0x0, 0x0) ptrace(0x10, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r7, 0x5}, 0x1c}}, 0x0) r8 = dup3(r5, r6, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000380)={{0x0, 0x8}, 'port0\x00', 0x20, 0x0, 0x84, 0x1, 0xbd, 0x3f, 0xfffffffe, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8000000200036158, 0x800027b}, r4, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cifs\x00', 0xc0ed0040, 0x0) sched_setaffinity(r4, 0x8, &(0x7f00000000c0)=0x6) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xdd}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 20:10:20 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 707.420688] Free swap = 0kB [ 707.424417] Total swap = 0kB [ 707.427689] 1965979 pages RAM [ 707.431289] 0 pages HighMem/MovableOnly [ 707.435670] 341741 pages reserved [ 707.439608] 0 pages cma reserved 20:10:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x300, @dev}]}, 0x2c}}, 0x0) 20:10:20 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:20 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="970a90d81825c31b8c84ec03000000f24e3b340f2904a83ea062ce7b7bcd86b353837708cd1a9458c65248efe59a3bf96f705925ad39baf4668c3543"], 0x35) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendfile(r1, r2, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) 20:10:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x324, @dev}]}, 0x2c}}, 0x0) 20:10:20 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x3) r1 = socket(0x2, 0x1000000000000002, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x10000000}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x250382, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7}) [ 708.002901] kasan: CONFIG_KASAN_INLINE enabled 20:10:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x336, @dev}]}, 0x2c}}, 0x0) [ 708.032624] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 708.110993] syz-executor.2: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 708.123459] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 708.129737] CPU: 0 PID: 10330 Comm: modprobe Not tainted 4.19.101-syzkaller #0 [ 708.137229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.146608] RIP: 0010:path_openat+0x293/0x4500 [ 708.151208] Code: 80 3c 02 00 0f 85 fa 34 00 00 48 8b 85 28 ff ff ff 48 8b 58 58 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 b7 [ 708.170131] RSP: 0018:ffff888022547ae0 EFLAGS: 00010247 [ 708.175504] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff81b02b3e [ 708.182786] RDX: 0000000000000000 RSI: ffffffff81b02b4c RDI: 0000000000000004 [ 708.190171] RBP: ffff888022547c60 R08: ffff88809ef66300 R09: 0000000000000001 [ 708.197644] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000000 [ 708.205685] R13: ffff888022547e60 R14: ffff888022547e60 R15: ffff888022547ca0 [ 708.212971] FS: 00007fb83d0cd700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 708.221210] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 708.227103] CR2: 00007fc72879e190 CR3: 000000004189a000 CR4: 00000000001406f0 [ 708.234655] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 708.241948] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 708.249229] Call Trace: [ 708.251834] ? __lock_acquire+0x6ee/0x49c0 [ 708.256195] ? getname+0x1a/0x20 [ 708.259602] ? do_sys_open+0x2c9/0x550 [ 708.263522] ? __x64_sys_open+0x7e/0xc0 [ 708.267546] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 708.272254] ? __lock_is_held+0xb6/0x140 [ 708.276358] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 708.281157] ? __alloc_fd+0x44d/0x560 [ 708.284992] do_filp_open+0x1a1/0x280 [ 708.288828] ? may_open_dev+0x100/0x100 [ 708.292834] ? do_raw_spin_unlock+0x181/0x270 [ 708.297345] ? _raw_spin_unlock+0x2d/0x50 [ 708.301519] ? __alloc_fd+0x44d/0x560 [ 708.303163] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 708.305366] do_sys_open+0x3fe/0x550 [ 708.305384] ? filp_open+0x80/0x80 [ 708.310923] CPU: 1 PID: 10359 Comm: syz-executor.2 Not tainted 4.19.101-syzkaller #0 [ 708.314460] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 708.317973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.325853] ? do_syscall_64+0x26/0x620 [ 708.330601] Call Trace: [ 708.339980] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.343955] dump_stack+0x197/0x210 [ 708.346536] ? do_syscall_64+0x26/0x620 [ 708.351893] warn_alloc.cold+0x7b/0x173 [ 708.355501] __x64_sys_open+0x7e/0xc0 [ 708.359480] ? zone_watermark_ok_safe+0x260/0x260 [ 708.363442] do_syscall_64+0xfd/0x620 [ 708.367238] ? __lock_is_held+0xb6/0x140 [ 708.372076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.375870] __alloc_pages_slowpath+0x2214/0x2870 [ 708.379924] RIP: 0033:0x7fb83c9e5120 [ 708.385237] ? warn_alloc+0x110/0x110 [ 708.390089] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 708.390104] RSP: 002b:00007ffe70ccef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 708.393838] ? __lock_is_held+0xb6/0x140 [ 708.397617] RAX: ffffffffffffffda RBX: 000055dac54484b6 RCX: 00007fb83c9e5120 [ 708.416535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 708.424244] RDX: 00007ffe70ccf164 RSI: 0000000000080000 RDI: 00007ffe70ccf140 [ 708.424257] RBP: 000055dac5448260 R08: 0000000000000000 R09: 000055dac5448119 [ 708.428334] ? should_fail+0x14d/0x85c [ 708.435599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 708.441138] ? __isolate_free_page+0x4c0/0x4c0 [ 708.448407] R13: 000055dac5448110 R14: 000055dac5448210 R15: 00007ffe70ccf140 [ 708.455701] ? __might_sleep+0x95/0x190 [ 708.459566] Modules linked in: [ 708.466836] __alloc_pages_nodemask+0x617/0x750 [ 708.474350] ---[ end trace 22f10f97c4dcce81 ]--- [ 708.478723] ? __alloc_pages_slowpath+0x2870/0x2870 [ 708.478744] ? fs_reclaim_acquire+0x20/0x20 [ 708.482788] RIP: 0010:path_openat+0x293/0x4500 [ 708.485894] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 708.485909] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 708.485926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.490599] Code: 80 3c 02 00 0f 85 fa 34 00 00 48 8b 85 28 ff ff ff 48 8b 58 58 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 b7 [ 708.495500] alloc_pages_current+0x107/0x210 [ 708.495519] ion_page_pool_alloc+0x17f/0x270 [ 708.495538] ion_system_heap_allocate+0x154/0xa90 [ 708.500751] RSP: 0018:ffff888022547ae0 EFLAGS: 00010247 [ 708.504883] ? ion_system_heap_free+0x250/0x250 [ 708.504899] ? ion_alloc+0x306/0x900 [ 708.504931] ion_alloc+0x29b/0x900 [ 708.509743] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff81b02b3e [ 708.515171] ? ion_dma_buf_release+0x50/0x50 [ 708.515190] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 708.515203] ? _copy_from_user+0xdd/0x150 [ 708.515221] ion_ioctl+0x17b/0x329 [ 708.521097] RDX: 0000000000000000 RSI: ffffffff81b02b4c RDI: 0000000000000004 [ 708.526504] ? ion_alloc.cold+0x28/0x28 [ 708.526523] ? __might_sleep+0x95/0x190 [ 708.526537] ? ion_alloc.cold+0x28/0x28 [ 708.526556] do_vfs_ioctl+0xd5f/0x1380 [ 708.545660] RBP: ffff888022547c60 R08: ffff88809ef66300 R09: 0000000000000001 [ 708.549896] ? selinux_file_ioctl+0x46c/0x5d0 [ 708.549911] ? selinux_file_ioctl+0x125/0x5d0 [ 708.549930] ? ioctl_preallocate+0x210/0x210 [ 708.554552] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000000 [ 708.559208] ? selinux_file_mprotect+0x620/0x620 [ 708.559238] ? iterate_fd+0x360/0x360 [ 708.564798] R13: ffff888022547e60 R14: ffff888022547e60 R15: ffff888022547ca0 [ 708.569284] ? nsecs_to_jiffies+0x30/0x30 [ 708.569306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.573187] FS: 00007fb83d0cd700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 708.576557] ? security_file_ioctl+0x8d/0xc0 [ 708.576574] ksys_ioctl+0xab/0xd0 [ 708.576592] __x64_sys_ioctl+0x73/0xb0 [ 708.584064] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 708.588278] do_syscall_64+0xfd/0x620 [ 708.588300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.593930] CR2: 000000000042f920 CR3: 000000004189a000 CR4: 00000000001406f0 [ 708.597953] RIP: 0033:0x45b399 [ 708.597965] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 708.597981] RSP: 002b:00007f90fe60bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 708.601522] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 708.608775] RAX: ffffffffffffffda RBX: 00007f90fe60c6d4 RCX: 000000000045b399 [ 708.608783] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000006 [ 708.608790] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 708.608797] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 708.608804] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 708.636791] syz-executor.4: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 708.637414] syz-executor.1: page allocation failure: order:4, mode:0x62c0c2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0 [ 708.648378] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 708.655245] warn_alloc_show_mem: 4 callbacks suppressed [ 708.655250] Mem-Info: [ 708.680058] CPU: 1 PID: 10273 Comm: syz-executor.4 Tainted: G D 4.19.101-syzkaller #0 [ 708.693105] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 708.695617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.695621] Call Trace: [ 708.695644] dump_stack+0x197/0x210 [ 708.695664] warn_alloc.cold+0x7b/0x173 [ 708.695684] ? zone_watermark_ok_safe+0x260/0x260 [ 708.724096] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 708.724879] ? compaction_deferred+0x16a/0x3b0 [ 708.746808] active_anon:330574 inactive_anon:206 isolated_anon:0 [ 708.746808] active_file:2755 inactive_file:2888 isolated_file:21 [ 708.746808] unevictable:0 dirty:37 writeback:0 unstable:0 [ 708.746808] slab_reclaimable:15541 slab_unreclaimable:117611 [ 708.746808] mapped:56544 shmem:397 pagetables:4605 bounce:0 [ 708.746808] free:885047 free_pcp:216 free_cma:0 [ 708.751512] ? try_to_compact_pages+0x44/0xae0 [ 708.751536] __alloc_pages_slowpath+0x2214/0x2870 [ 708.751559] ? warn_alloc+0x110/0x110 [ 708.768739] Node 0 active_anon:1322036kB inactive_anon:816kB active_file:4676kB inactive_file:2128kB unevictable:0kB isolated(anon):0kB isolated(file):84kB mapped:213232kB dirty:124kB writeback:0kB shmem:1580kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 587776kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 708.773368] ? __lock_is_held+0xb6/0x140 [ 708.773385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 708.773403] ? should_fail+0x14d/0x85c [ 708.773422] ? __isolate_free_page+0x4c0/0x4c0 [ 708.783520] Kernel panic - not syncing: Fatal exception [ 708.788024] ? __might_sleep+0x95/0x190 [ 708.984600] __alloc_pages_nodemask+0x617/0x750 [ 708.989295] ? __alloc_pages_slowpath+0x2870/0x2870 [ 708.994360] ? fs_reclaim_acquire+0x20/0x20 [ 708.998705] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 709.004273] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 709.009987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.015533] alloc_pages_current+0x107/0x210 [ 709.019946] ion_page_pool_alloc+0x17f/0x270 [ 709.024354] ion_system_heap_allocate+0x154/0xa90 [ 709.029341] ? ion_system_heap_free+0x250/0x250 [ 709.034025] ? ion_alloc+0x306/0x900 [ 709.037760] ion_alloc+0x29b/0x900 [ 709.041316] ? ion_dma_buf_release+0x50/0x50 [ 709.045754] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 709.051290] ? _copy_from_user+0xdd/0x150 [ 709.055435] ion_ioctl+0x17b/0x329 [ 709.058975] ? ion_alloc.cold+0x28/0x28 [ 709.062949] ? __might_sleep+0x95/0x190 [ 709.066922] ? ion_alloc.cold+0x28/0x28 [ 709.070915] do_vfs_ioctl+0xd5f/0x1380 [ 709.074823] ? selinux_file_ioctl+0x46c/0x5d0 [ 709.079326] ? selinux_file_ioctl+0x125/0x5d0 [ 709.083830] ? ioctl_preallocate+0x210/0x210 [ 709.088236] ? selinux_file_mprotect+0x620/0x620 [ 709.092991] ? iterate_fd+0x360/0x360 [ 709.096788] ? nsecs_to_jiffies+0x30/0x30 [ 709.100932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.106463] ? security_file_ioctl+0x8d/0xc0 [ 709.110880] ksys_ioctl+0xab/0xd0 [ 709.114327] __x64_sys_ioctl+0x73/0xb0 [ 709.118211] do_syscall_64+0xfd/0x620 [ 709.122007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.127190] RIP: 0033:0x45b399 [ 709.130393] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 709.149298] RSP: 002b:00007f42aa91bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 709.157045] RAX: ffffffffffffffda RBX: 00007f42aa91c6d4 RCX: 000000000045b399 [ 709.164453] RDX: 00000000200001c0 RSI: 00000000c0184900 RDI: 0000000000000004 [ 709.171724] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 709.178986] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 709.186252] R13: 0000000000000360 R14: 00000000004c4866 R15: 000000000075bf2c [ 709.195019] Kernel Offset: disabled [ 709.198650] Rebooting in 86400 seconds..