ffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:24 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000001c0)=0xffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = socket$kcm(0x11, 0x0, 0x300) recvmsg$kcm(r2, &(0x7f0000002600)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x200}, [@alu={0x4, 0x0, 0x3, 0x99e1ee530ff1a670, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x71, &(0x7f0000000200)=""/113, 0x41000, 0x2, [], r3, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x4}, 0x8, 0x10, 0x0}, 0x70) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xfffffffd, 0x1, 0xffffffffffffffff, 0x0, [], r3, r1, 0x0, 0xfffffffe}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r4, &(0x7f0000001140)="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", &(0x7f0000000000)=""/118, 0xb1d2cc78015fce4d}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000180)=0x1) [ 2506.033928][T22019] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2506.585957][T22001] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2506.642230][T21993] chnl_net:caif_netlink_parms(): no params data found [ 2506.991434][T22021] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2507.018211][T21975] chnl_net:caif_netlink_parms(): no params data found [ 2507.298449][T21993] bridge0: port 1(bridge_slave_0) entered blocking state [ 2507.307721][T21993] bridge0: port 1(bridge_slave_0) entered disabled state [ 2507.317720][T21993] device bridge_slave_0 entered promiscuous mode [ 2507.405922][T21993] bridge0: port 2(bridge_slave_1) entered blocking state [ 2507.415189][T21993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2507.424937][T21993] device bridge_slave_1 entered promiscuous mode [ 2507.458091][T21975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2507.467754][T21975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2507.477432][T21975] device bridge_slave_0 entered promiscuous mode [ 2507.555071][T21975] bridge0: port 2(bridge_slave_1) entered blocking state [ 2507.563567][T21975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2507.573392][T21975] device bridge_slave_1 entered promiscuous mode [ 2507.586797][T21993] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2507.661454][T21993] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2507.677101][T21975] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2507.705324][T21975] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2507.717863][T21993] team0: Port device team_slave_0 added [ 2507.786419][T21993] team0: Port device team_slave_1 added [ 2507.878604][T21975] team0: Port device team_slave_0 added [ 2507.897811][T21975] team0: Port device team_slave_1 added [ 2507.954505][T21993] device hsr_slave_0 entered promiscuous mode [ 2508.001399][T21993] device hsr_slave_1 entered promiscuous mode [ 2508.060066][T21993] debugfs: Directory 'hsr0' with parent '/' already present! [ 2508.215016][T21975] device hsr_slave_0 entered promiscuous mode [ 2508.251305][T21975] device hsr_slave_1 entered promiscuous mode [ 2508.299970][T21975] debugfs: Directory 'hsr0' with parent '/' already present! [ 2508.665624][T21993] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2508.717891][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2508.727840][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2508.804434][T21993] 8021q: adding VLAN 0 to HW filter on device team0 [ 2508.823413][T21975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2508.886531][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2508.897034][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2508.906561][ T8864] bridge0: port 1(bridge_slave_0) entered blocking state [ 2508.913722][ T8864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2508.926123][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2508.954173][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2508.965752][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2508.975759][T10761] bridge0: port 2(bridge_slave_1) entered blocking state [ 2508.982909][T10761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2508.991820][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2509.052354][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2509.064800][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2509.076731][T21975] 8021q: adding VLAN 0 to HW filter on device team0 [ 2509.092811][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2509.111951][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2509.123006][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2509.132376][T25921] bridge0: port 1(bridge_slave_0) entered blocking state [ 2509.139457][T25921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2509.216341][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2509.225737][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2509.235886][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2509.245817][T24866] bridge0: port 2(bridge_slave_1) entered blocking state [ 2509.252954][T24866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2509.262294][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2509.272883][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2509.336759][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2509.348390][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2509.375278][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2509.386982][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2509.397662][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2509.409562][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2509.421522][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2509.491473][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2509.501525][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2509.522473][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2509.586266][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2509.596555][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2509.606295][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2509.616054][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2509.626107][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2509.636103][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2509.696932][T21993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2509.709720][T21975] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2509.723167][T21975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2509.732758][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2509.745062][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2509.844611][T21993] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2509.859443][T21975] 8021q: adding VLAN 0 to HW filter on device batadv0 05:52:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r4 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) [ 2510.313629][T22072] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2510.334172][T22072] CPU: 0 PID: 22072 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2510.342146][T22072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2510.352219][T22072] Call Trace: [ 2510.355536][T22072] dump_stack+0x172/0x1f0 [ 2510.359905][T22072] dump_header+0x10b/0x82d [ 2510.364361][T22072] oom_kill_process.cold+0x10/0x15 [ 2510.369505][T22072] out_of_memory+0x334/0x1340 [ 2510.374194][T22072] ? cgroup_file_notify+0x140/0x1b0 [ 2510.379406][T22072] ? oom_killer_disable+0x280/0x280 [ 2510.384659][T22072] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2510.390233][T22072] ? memcg_stat_show+0xc40/0xc40 [ 2510.395208][T22072] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2510.401049][T22072] ? cgroup_file_notify+0x140/0x1b0 [ 2510.406288][T22072] memory_max_write+0x262/0x3a0 [ 2510.411171][T22072] ? mem_cgroup_write+0x370/0x370 [ 2510.416218][T22072] ? lock_acquire+0x190/0x410 [ 2510.420914][T22072] ? kernfs_fop_write+0x227/0x480 [ 2510.425970][T22072] cgroup_file_write+0x241/0x790 [ 2510.430924][T22072] ? mem_cgroup_write+0x370/0x370 [ 2510.435963][T22072] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2510.441629][T22072] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2510.447266][T22072] kernfs_fop_write+0x2b8/0x480 [ 2510.452225][T22072] __vfs_write+0x8a/0x110 [ 2510.456578][T22072] ? kernfs_fop_open+0xd80/0xd80 [ 2510.461543][T22072] vfs_write+0x268/0x5d0 [ 2510.465821][T22072] ksys_write+0x14f/0x290 [ 2510.470184][T22072] ? __ia32_sys_read+0xb0/0xb0 [ 2510.474973][T22072] ? do_syscall_64+0x26/0x760 [ 2510.479670][T22072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2510.485773][T22072] ? do_syscall_64+0x26/0x760 [ 2510.490492][T22072] __x64_sys_write+0x73/0xb0 [ 2510.495111][T22072] do_syscall_64+0xfa/0x760 [ 2510.499763][T22072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2510.505670][T22072] RIP: 0033:0x459a59 [ 2510.509579][T22072] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2510.529231][T22072] RSP: 002b:00007f1cdabf6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2510.537677][T22072] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2510.545677][T22072] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 2510.553690][T22072] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2510.561689][T22072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cdabf76d4 [ 2510.569690][T22072] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2510.582295][T22072] memory: usage 6612kB, limit 0kB, failcnt 458 [ 2510.588663][T22072] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2510.596128][T22072] Memory cgroup stats for /syz4: [ 2510.596253][T22072] anon 4259840 [ 2510.596253][T22072] file 49152 [ 2510.596253][T22072] kernel_stack 65536 [ 2510.596253][T22072] slab 2285568 [ 2510.596253][T22072] sock 0 [ 2510.596253][T22072] shmem 221184 [ 2510.596253][T22072] file_mapped 0 [ 2510.596253][T22072] file_dirty 135168 [ 2510.596253][T22072] file_writeback 0 [ 2510.596253][T22072] anon_thp 4194304 [ 2510.596253][T22072] inactive_anon 135168 [ 2510.596253][T22072] active_anon 4259840 [ 2510.596253][T22072] inactive_file 16384 [ 2510.596253][T22072] active_file 12288 [ 2510.596253][T22072] unevictable 0 [ 2510.596253][T22072] slab_reclaimable 1486848 [ 2510.596253][T22072] slab_unreclaimable 798720 [ 2510.596253][T22072] pgfault 257994 [ 2510.596253][T22072] pgmajfault 0 [ 2510.596253][T22072] workingset_refault 0 [ 2510.596253][T22072] workingset_activate 0 [ 2510.596253][T22072] workingset_nodereclaim 0 [ 2510.596253][T22072] pgrefill 1610 [ 2510.596253][T22072] pgscan 7046 [ 2510.596253][T22072] pgsteal 3188 [ 2510.771220][T22072] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22071,uid=0 [ 2510.789324][T22072] Memory cgroup out of memory: Killed process 22071 (syz-executor.4) total-vm:72712kB, anon-rss:4240kB, file-rss:35832kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 2510.814621][ T1071] oom_reaper: reaped process 22071 (syz-executor.4), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB 05:52:30 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:52:30 executing program 0: socket$kcm(0x2, 0x20000000002, 0x73) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x20) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xbcd8781b067b5e83) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x800000000006, 0xffffffffffffffff, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000100)=0x9) socket$kcm(0xa, 0xffffffffffffffff, 0x11) socket$kcm(0x10, 0x3, 0x10) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="51c0f4e3c0f449f8aee78f45e92680468d1dfd8580feb0a38202a38be2f50000efca63000000000000000edfdfce911bc08094782d8842b06331250de69bf101605d9f2f8b7759b37e5f44aa44239f9dcd38f17b17aa5c6527c4bd09adb13fca93528c4100e03b23daeead3b3c72bb9efb4a7e09863046ffa9a9d03d72fec870601c115f06f455553614e86ee1e9e4de3d876e0a370f41e2f429f9594a57f6e3f19f7f909847d92d0a32d919b72fb74407d0aef8848c3dbf41f3e43bd5f8b5a2b46c23f2ea15df23c3989bb6078a52595f68a06ac6036ca4c5d6e00800"/235], 0x1e) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) write$cgroup_pid(r2, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) openat$cgroup_ro(r5, &(0x7f00000003c0)='cpuset.memory_pressure\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000400)='cpu.stat\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0xfffffffffffffdcc) 05:52:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c040000}, 0x0) 05:52:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4e339) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x27f, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2510.904663][T21993] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2510.971784][T22085] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2510.973529][T21993] CPU: 0 PID: 21993 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2510.989047][T21993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2510.999109][T21993] Call Trace: [ 2511.002408][T21993] dump_stack+0x172/0x1f0 [ 2511.006741][T21993] dump_header+0x10b/0x82d [ 2511.006755][T21993] ? oom_kill_process+0x94/0x3f0 [ 2511.006773][T21993] oom_kill_process.cold+0x10/0x15 [ 2511.006794][T21993] out_of_memory+0x334/0x1340 [ 2511.025885][T21993] ? lock_downgrade+0x920/0x920 [ 2511.030739][T21993] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2511.030757][T21993] ? oom_killer_disable+0x280/0x280 [ 2511.030781][T21993] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2511.030794][T21993] ? memcg_stat_show+0xc40/0xc40 [ 2511.030812][T21993] ? do_raw_spin_unlock+0x57/0x270 [ 2511.057323][T21993] ? _raw_spin_unlock+0x2d/0x50 [ 2511.057346][T21993] try_charge+0xf4b/0x1440 [ 2511.057379][T21993] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2511.072154][T21993] ? percpu_ref_tryget_live+0x111/0x290 [ 2511.077708][T21993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2511.083958][T21993] ? __kasan_check_read+0x11/0x20 [ 2511.089001][T21993] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2511.094566][T21993] mem_cgroup_try_charge+0x136/0x590 [ 2511.099865][T21993] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2511.105511][T21993] wp_page_copy+0x407/0x1860 [ 2511.110121][T21993] ? find_held_lock+0x35/0x130 [ 2511.110140][T21993] ? do_wp_page+0x53b/0x15c0 [ 2511.110158][T21993] ? pmd_devmap_trans_unstable+0x220/0x220 [ 2511.110176][T21993] ? lock_downgrade+0x920/0x920 [ 2511.119502][T21993] ? swp_swapcount+0x540/0x540 [ 2511.119518][T21993] ? __kasan_check_read+0x11/0x20 [ 2511.119535][T21993] ? do_raw_spin_unlock+0x57/0x270 [ 2511.119554][T21993] do_wp_page+0x543/0x15c0 [ 2511.149432][T21993] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 2511.154827][T21993] __handle_mm_fault+0x23ec/0x4040 [ 2511.159948][T21993] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2511.165495][T21993] ? handle_mm_fault+0x292/0xaa0 [ 2511.170456][T21993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2511.176698][T21993] ? __kasan_check_read+0x11/0x20 [ 2511.181731][T21993] handle_mm_fault+0x3b7/0xaa0 [ 2511.186500][T21993] __do_page_fault+0x536/0xdd0 [ 2511.191280][T21993] do_page_fault+0x38/0x590 [ 2511.195792][T21993] page_fault+0x39/0x40 [ 2511.199938][T21993] RIP: 0033:0x430b36 [ 2511.199952][T21993] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 2511.199959][T21993] RSP: 002b:00007fffaccaf150 EFLAGS: 00010206 [ 2511.199970][T21993] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 2511.199979][T21993] RDX: 0000000002444930 RSI: 000000000244c970 RDI: 0000000000000003 [ 2511.199987][T21993] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002443940 [ 2511.199994][T21993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 05:52:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c050000}, 0x0) [ 2511.200006][T21993] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 2511.350094][T21993] memory: usage 2180kB, limit 0kB, failcnt 466 [ 2511.356609][T21993] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2511.367016][T21993] Memory cgroup stats for /syz4: [ 2511.367127][T21993] anon 8192 [ 2511.367127][T21993] file 49152 [ 2511.367127][T21993] kernel_stack 0 [ 2511.367127][T21993] slab 2285568 [ 2511.367127][T21993] sock 0 [ 2511.367127][T21993] shmem 221184 [ 2511.367127][T21993] file_mapped 0 [ 2511.367127][T21993] file_dirty 135168 [ 2511.367127][T21993] file_writeback 0 [ 2511.367127][T21993] anon_thp 0 [ 2511.367127][T21993] inactive_anon 135168 [ 2511.367127][T21993] active_anon 8192 [ 2511.367127][T21993] inactive_file 16384 [ 2511.367127][T21993] active_file 12288 [ 2511.367127][T21993] unevictable 0 [ 2511.367127][T21993] slab_reclaimable 1486848 [ 2511.367127][T21993] slab_unreclaimable 798720 [ 2511.367127][T21993] pgfault 257994 [ 2511.367127][T21993] pgmajfault 0 [ 2511.367127][T21993] workingset_refault 0 [ 2511.367127][T21993] workingset_activate 0 [ 2511.367127][T21993] workingset_nodereclaim 0 [ 2511.367127][T21993] pgrefill 1610 [ 2511.367127][T21993] pgscan 7046 [ 2511.367127][T21993] pgsteal 3188 [ 2511.367127][T21993] pgactivate 2805 05:52:30 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r4 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) [ 2511.658818][T21993] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=21993,uid=0 [ 2511.737605][T21993] Memory cgroup out of memory: Killed process 21993 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 05:52:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() socket$kcm(0xa, 0x1, 0x0) [ 2511.854596][ T1071] oom_reaper: reaped process 21993 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 05:52:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4e33a) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x400, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x1}, 0xffffffffffffffff, 0x4000000, 0xffffffffffffffff, 0x1) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000440)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="e2a504000000976bcc9127803ab51ca3baf340d40ed67d00000000000000000000f6b0297d0f7ace6341c073c813ddc6d5e1396b56936808fbc5c3ef0b43255033c9d9d99d781f4bc0c07382a821eb4367799b999186eb8e9e9c17ca48b82814b9719565d74fe6b6805373e5aa41d3eac32a8c9adc593ff75de16d88a626b44ef3cae2188db698c6ab81ac838ab2b5ee163498197a441ceb31f9b45fa5db"], 0x90ad) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000800)=@can, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)}, {&(0x7f00000008c0)=""/7, 0x7}, {&(0x7f0000000900)=""/15, 0xf}], 0x3, &(0x7f0000000980)=""/205, 0xcd}, 0x100) 05:52:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() 05:52:32 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:52:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) 05:52:32 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:52:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c060000}, 0x0) [ 2513.166439][T22168] device nr0 entered promiscuous mode [ 2513.185169][T22090] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2513.968909][T22150] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:52:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x280, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 05:52:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c080000}, 0x0) 05:52:33 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) close(r0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x3f, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xc, @perf_config_ext={0x9, 0xd27}, 0x200, 0x0, 0x0, 0x0, 0xfff, 0x0, 0xff77}, 0x0, 0x7, r1, 0x1) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x7f, 0x1, 0xff, 0x0, 0x0, 0x1ff, 0x48480, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_config_ext={0x7, 0xbbda}, 0x8000, 0x2, 0x6, 0xf, 0x9, 0x0, 0x400}, r2, 0xc, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x18, &(0x7f0000000580)=ANY=[@ANYBLOB="24ff263153f44f783ba039dbae5ca2622a312e126b9db501cc8c8249939748150a2d2e5780c0198dc6c0a8d52bf5f8b975cf0112ee95de2a410118ed817745920e72ce9ac22ecd012007861c4a01d2ee9ec76be66acd554250e03d062095512bd45098000a02f60c3e67ee751e634e8001f5bc511aa5c617517b9b486f14601a0f901d9e103f0f59b15b8c098fb64d67c9debce4f4cd1f99eeca5caf2fbb93c68546fea31797d678dbde937f5aca26bfa10754d1e78d3898679fc9f3da27d524ebe8"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00=', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0x10}, 0x70) socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80), 0x4) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000440)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x4, &(0x7f0000000840)=ANY=[@ANYBLOB="00250000000000000095a6e8000000000000000000005b68f3f246371baf24ebbc4bd4db57f05ef5f13b7202a9e860294ca4e5c50fc0ee0ee30641a0aebc2df1d42d52d0b1da18d1847f41669dfd5904c1162d419ec1a589520749d2ce174298d230f048222409407e14bd9394f3a470dbdbfddb7237e117627582c13971358942bbc31b69a1d63275dbbe0342511a662427af0b263e17ddb181b09242715ad67b2d513db5178dd0b81465df7e692c0a1bb52a3b29b22ff584bb8f687bb172c52db2e48ff8f28d0f6357b7b500"/215], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) socket$kcm(0xa, 0x2, 0x11) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(0xffffffffffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$TUNGETDEVNETNS(r7, 0x54e3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002b80)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r9 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r8, 0x161) sendmsg$kcm(r9, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r9, &(0x7f0000000400)=ANY=[@ANYBLOB="006d76ff6f74501691c3551b727920"], 0xfdef) [ 2514.209955][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2514.215866][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2514.221786][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2514.227533][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2514.233435][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2514.239228][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2514.245171][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2514.251026][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2514.256887][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2514.262747][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) [ 2514.728598][T22228] IPVS: ftp: loaded support on port[0] = 21 [ 2514.745490][T22151] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:52:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4e33b) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xf, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r2}) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x29}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 05:52:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0) 05:52:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) [ 2515.154139][T22209] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:52:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x8000000000002, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000001340)=0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(r2, 0x8924, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000001d40)) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="173be0b77872a26c4a12531dc9bff201fb0913cc3441130889104feb54", 0x1d}, {&(0x7f0000001600)="89c93680326f5eef7e6ffd433f34c2ef711dd73253af22f68c6cb6fe166372fa25f6758837801f8650fa1ef42be033fe44b8614f3d4bee40483ba5b4c0edcd02e0a40f6c5f46ed8e3c0ebeb79f9655b4b41071436ce480b54092ced67c9dcb756ec1d786020219f2e0f5bab724150ca497f9e17e60e17735e5d2f83e74d8babe5ca4b7cf624c1bc66a4e71511a4d2c056a73912389badccb5401f03a1601feb9edc251d9fb191e4dea25fea686ce19f7aa6537c0b820192e85551b9a6acfbba5f2d1772755d015e55dda70b83e50364b0ace28719c3f", 0xd6}, {&(0x7f0000001740)="c46113b58dfa73d555183c2fc4aa2a32d8c46e68eeca3e7d010ea0c2a91ded6c1e92547ccf2af8737e8914320d52c07a2382bcddb607dda0e28c2f4445fc22a56f8598cec6c4ce189171f123461fac46a0c300f340b1fbd923a7d929a1b06ddcff010249fdc7922efb47af0a4b1fc80734d38af9b0a9fc55007f47dc28effbdcf5bb928348d0074e5e02641ba74a33f357f29d9eed76c2d98a8e600122ae", 0x9e}, {&(0x7f0000001800)="8bd9c4b1e4f6e054bda24c16be92fc18a1ccfde358e6ca02ccc41e26cbf1ea328f6ce9687737305177e10f788e6990aae4d17ca3c02be789e34ed72c9c944920e422507df1582fd45c8d8fe57f4a2cecc022e0344f92c9c893102cbc4e5032b7232dda0b8b4e8105008a364587d4d5b18d90f2165c09aba32f660c6356ea1f5386dbc717d64e653de45c2da8c5550a97bc8e0e30ca19ab3efd5f767faae98fcd9e55653bd07d5bd07f0c1a35eb775071d753ceb7b2860c87fe4566a778691d30016261275ec837badb1f4bcb0efa802f1dcac13bfec29b42c8", 0xd9}], 0x4, &(0x7f0000001900)=[{0x98, 0xcd1f0f27cd560dfb, 0x1, "b2b73b176e6ad938fac646374125259056133d9dd69fa955090010e89bb84f12c6e020a9fecf1aceb7b9f7af28ae41a4fbee3b5706cda2cd62b9cbe5398ada6e2b0a0bb50800a9ea2f033e1c2b48a195e4c58f2ecffc5f80616f47192eecbe0fe551f11f7d8904d708375c2189521152bc6e061b651d252a34fb9bf3ab368198f5"}, {0x108, 0x100, 0x8000, "c1132889451211dcd5c5eca491f1cf49ccfd7c2a7f2ab041101df90daae00e80b39dfd9c7c46d64bab2531275dc9d5bcea226552308c6408c30085dda69b87db4c83421c4c4bc48a3cb2858ce0c92b87db24c42d0911d1ab41e19e69502b65dbca455b9ec969b87b1912849a99ec3472412456fb8843dececc5b14fddeac4a281552bbc6f7b45ebcddef7207c08a1450d39617b49d33eae47763aa494ab20cc2bf5f283b68918e86fdd01c18b58189de24f6f1af460e035f3ba02cc61263c73b390a224b53fa0691fdbb3b6d77d3466a8a4a06b08b0fc22126eefc1f4fe509f3b87a1e1008ffc61b5715dd9bb91c5302dd0fb39fd32c"}, {0xd0, 0x105, 0x4, "ae0346b61c29396ceb2f11f1a6f23d414739f43702d37ca287ba976848521cb6d2af4b54571cbef961f4404a8b9c393e54102a8d81fc9103386b48125bad5b9f857e32920e7edd96bfe62d5fe832ea09e04c0d7861d31f9a3cc94277a23cd2d62b0a8ad09160fcf0fec8bc6581267acb19aea288468fbfc212d5a092ca6405dfb03e84cd7a332c6e9b6bb07939af29a5f9945fd5fbe32cae2eb54240be731121d8d1dc7e5b159c071478c50c71a87b447c9a7f7407768c0eb51b9bdd54b4"}, {0xc8, 0x111, 0xfffffff9, "5ac8d1339a968ec7babcda866b68716a36b501b4ae146b901ba11aed29e662cb7cf8fd2f3781c242cb41ff30b2fd963626cd979269440244820aa1db2a3366b94a21abf3fe8c0b991c2f50c2d1313915d55e1430c21e86e3dd1db9c630a27801081c07af62810874e1959d45779948fe38fd78a7ad258b4fa7cd99949d61ae2863a043ad4f5992201d7390d991387c3bc724a966f928ac1c09d6528b73b0f560286ed46871859fd4a8350afb41a20c0ef8d5674690a72e"}, {0x58, 0x0, 0x0, "fcfe5ca021f0021591b459de3bf06e21485715c08a75293bb1ac20c06e6861b3412309e9fbec469cffe6902dc0dee8b3e21638d683458ad73848ddc0f2a5213ab635c988"}, {0x98, 0x2d1, 0x4, "b38ee4284661dd3d768cc9ffe801a8cf3e4ed70d5dc676c542b03bf941216b07a990bf38fb67523e82191c4768f8353150afdf8a6e06e611330ebb39c616bb68824bc9622ef55143d5e7762da8d1e98da8c98952c967fd276becb9553a8393f29e9c0c93f15ddcd4b694faaf039a0347a0c62db5de6d1a8bb8972e0d079666d490"}], 0x428}, 0x80048d0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000900)) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xb6, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000008}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x40, 0x53, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0xb7cd9151a086be9d, @perf_config_ext={0xb71c, 0x800}, 0x440, 0x200, 0x7fffffff, 0x3, 0x10001, 0x3, 0x7}, 0xffffffffffffffff, 0x0, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0xffff, 0x10001}, 0xc) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') recvmsg$kcm(r4, &(0x7f0000002000)={&(0x7f0000001d80)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001e00)=""/200, 0xc8}, {&(0x7f0000001f00)=""/9, 0x9}], 0x2, &(0x7f0000001f80)=""/97, 0x61}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400000) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) recvmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000100)=""/52, 0x34}, {&(0x7f00000001c0)=""/171, 0xab}, {&(0x7f0000000280)=""/4096, 0x4000}, {&(0x7f0000001280)=""/157, 0x9d}, {&(0x7f0000001380)=""/110, 0x6e}, {&(0x7f0000001400)=""/160, 0xa0}, {&(0x7f00000014c0)=""/144, 0x90}], 0x4}, 0x0) [ 2515.752039][T22281] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 2515.933593][T22281] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 2515.977827][T22210] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2516.057047][T22283] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 2516.439044][T22288] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 2516.508096][T22228] chnl_net:caif_netlink_parms(): no params data found [ 2516.532663][T22288] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 2516.658159][T22228] bridge0: port 1(bridge_slave_0) entered blocking state [ 2516.677357][T22228] bridge0: port 1(bridge_slave_0) entered disabled state [ 2516.694919][T22228] device bridge_slave_0 entered promiscuous mode [ 2516.761367][T22228] bridge0: port 2(bridge_slave_1) entered blocking state [ 2516.768475][T22228] bridge0: port 2(bridge_slave_1) entered disabled state [ 2516.794752][T22228] device bridge_slave_1 entered promiscuous mode [ 2516.825756][T22228] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2516.891825][T22228] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2516.922022][T22228] team0: Port device team_slave_0 added [ 2516.931705][T22228] team0: Port device team_slave_1 added [ 2517.084426][T22228] device hsr_slave_0 entered promiscuous mode [ 2517.131275][T22228] device hsr_slave_1 entered promiscuous mode [ 2517.170463][T22228] debugfs: Directory 'hsr0' with parent '/' already present! [ 2517.252852][T22228] bridge0: port 2(bridge_slave_1) entered blocking state [ 2517.259988][T22228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2517.267363][T22228] bridge0: port 1(bridge_slave_0) entered blocking state [ 2517.274476][T22228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2517.413474][ T8864] bridge0: port 1(bridge_slave_0) entered disabled state [ 2517.422611][ T8864] bridge0: port 2(bridge_slave_1) entered disabled state [ 2517.599710][T22228] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2517.622201][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2517.631833][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2517.646979][T22228] 8021q: adding VLAN 0 to HW filter on device team0 [ 2517.708870][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2517.719193][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2517.728938][ T1375] bridge0: port 1(bridge_slave_0) entered blocking state [ 2517.736328][ T1375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2517.806629][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2517.817086][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2517.826761][T17863] bridge0: port 2(bridge_slave_1) entered blocking state [ 2517.833896][T17863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2517.854996][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2517.911230][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2517.935125][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2517.946338][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2517.956895][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2517.967869][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2517.994307][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2518.004056][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2518.014395][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2518.025747][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2518.036463][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2518.147875][T22228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2518.188767][T22228] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2518.446555][T22297] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2518.459041][T22297] CPU: 1 PID: 22297 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2518.466967][T22297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2518.477047][T22297] Call Trace: [ 2518.480351][T22297] dump_stack+0x172/0x1f0 [ 2518.484691][T22297] dump_header+0x10b/0x82d [ 2518.489111][T22297] oom_kill_process.cold+0x10/0x15 [ 2518.494222][T22297] out_of_memory+0x334/0x1340 [ 2518.498880][T22297] ? cgroup_file_notify+0x140/0x1b0 [ 2518.504060][T22297] ? oom_killer_disable+0x280/0x280 [ 2518.509243][T22297] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2518.514767][T22297] ? memcg_stat_show+0xc40/0xc40 [ 2518.519690][T22297] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2518.525479][T22297] ? cgroup_file_notify+0x140/0x1b0 [ 2518.530700][T22297] memory_max_write+0x262/0x3a0 [ 2518.535537][T22297] ? mem_cgroup_write+0x370/0x370 [ 2518.540541][T22297] ? lock_acquire+0x190/0x410 [ 2518.545199][T22297] ? kernfs_fop_write+0x227/0x480 [ 2518.550208][T22297] cgroup_file_write+0x241/0x790 [ 2518.555126][T22297] ? mem_cgroup_write+0x370/0x370 [ 2518.560144][T22297] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2518.565770][T22297] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2518.571384][T22297] kernfs_fop_write+0x2b8/0x480 [ 2518.576226][T22297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2518.582445][T22297] __vfs_write+0x8a/0x110 [ 2518.586751][T22297] ? kernfs_fop_open+0xd80/0xd80 [ 2518.591683][T22297] vfs_write+0x268/0x5d0 [ 2518.595919][T22297] ksys_write+0x14f/0x290 [ 2518.600231][T22297] ? __ia32_sys_read+0xb0/0xb0 [ 2518.604973][T22297] ? do_syscall_64+0x26/0x760 [ 2518.609625][T22297] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2518.615684][T22297] ? do_syscall_64+0x26/0x760 [ 2518.620344][T22297] __x64_sys_write+0x73/0xb0 [ 2518.624913][T22297] do_syscall_64+0xfa/0x760 [ 2518.629401][T22297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2518.635267][T22297] RIP: 0033:0x459a59 [ 2518.639143][T22297] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2518.658724][T22297] RSP: 002b:00007f5ad3092c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2518.667111][T22297] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2518.675062][T22297] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 2518.683028][T22297] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2518.690992][T22297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ad30936d4 [ 2518.698947][T22297] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2518.720177][T22297] memory: usage 6632kB, limit 0kB, failcnt 467 [ 2518.726430][T22297] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2518.733429][T22297] Memory cgroup stats for /syz4: [ 2518.733538][T22297] anon 4255744 [ 2518.733538][T22297] file 49152 [ 2518.733538][T22297] kernel_stack 65536 [ 2518.733538][T22297] slab 2285568 [ 2518.733538][T22297] sock 0 [ 2518.733538][T22297] shmem 221184 [ 2518.733538][T22297] file_mapped 0 [ 2518.733538][T22297] file_dirty 135168 [ 2518.733538][T22297] file_writeback 0 [ 2518.733538][T22297] anon_thp 4194304 [ 2518.733538][T22297] inactive_anon 135168 [ 2518.733538][T22297] active_anon 4255744 [ 2518.733538][T22297] inactive_file 16384 [ 2518.733538][T22297] active_file 12288 [ 2518.733538][T22297] unevictable 0 [ 2518.733538][T22297] slab_reclaimable 1486848 [ 2518.733538][T22297] slab_unreclaimable 798720 [ 2518.733538][T22297] pgfault 258060 [ 2518.733538][T22297] pgmajfault 0 [ 2518.733538][T22297] workingset_refault 0 [ 2518.733538][T22297] workingset_activate 0 [ 2518.733538][T22297] workingset_nodereclaim 0 [ 2518.733538][T22297] pgrefill 1610 [ 2518.733538][T22297] pgscan 7046 [ 2518.733538][T22297] pgsteal 3188 [ 2518.828204][T22297] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22295,uid=0 [ 2518.844456][T22297] Memory cgroup out of memory: Killed process 22295 (syz-executor.4) total-vm:72712kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 2518.867569][ T1071] oom_reaper: reaped process 22295 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 05:52:38 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:52:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) 05:52:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010000}, 0x0) 05:52:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4e33c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x281, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:38 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0x1, 0x81, 0x7, 0x3f, 0x0, 0x9, 0x88780, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_config_ext={0xb48}, 0x40, 0x7, 0x6, 0x9, 0x8, 0x0, 0x5}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xa) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000011c80)={&(0x7f0000011b40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000011c00)=[{&(0x7f0000011bc0)=""/11, 0xb}], 0x1, &(0x7f0000011c40)=""/32, 0x20}, 0x10020) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000011cc0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000011d00)={0x10, 0x4, 0x8, 0x101, 0x5, r0, 0x3, [], r1, r2, 0x3, 0x4}, 0x3c) socketpair(0x39ece0b67216764f, 0x4, 0x7, &(0x7f00000130c0)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000013840)={&(0x7f0000013100)=@tipc=@name={0x1e, 0x2, 0x33fd81c0589763fc, {{0x42, 0x1}}}, 0x80, &(0x7f0000013280)=[{&(0x7f0000013180)="747f6310e040f96ebfb18e0c4f9ac9361882d2929cb32f58104326719af8c7962822dd3a9ce9fcba21d41d91de0e871343173b869ce360425b8cee5bad580891769c90f02f68497fd7c662193152beff774a5ba71af739b67ed95f076e23c2c39dc0e35da706f9d1805e20a2dd270ae3845bc1745a942e110613b5de11c564dff6f195add67238d1d0403ec1d4c35ee38d31dcf6ffa03fc2bc9e732656c070cd0ead890fce4f994248f97a20c3d110e2cfa82806be56d532d9b126a3ab1d89bc13ef1ba3d3d1cef88d80760a431d682c7d892c8e16cc9dcfdb4898eb30a6cb8661c94ca81c415f7791bee066e3d24230086b053c", 0xf4}], 0x1, &(0x7f00000132c0)=[{0xa0, 0x102, 0x1f, "1133511693c3fa2c751d415845f80f25334dfd4eff81cd6931c82f15615b4d4ba9c099929474c963b43b9800a3971e240ec5f2cd52a033f2c92892c49fc0743788b9db9cb646a947626df2a771e575d2339dc41a8cbc9c1c03590fd68efb605267d7173549f772ffbfda6227c7b62dad80d41bf774a02e9e1ff1701f173a8ba906f98f897d9beba45edcac"}, {0xd0, 0x1, 0x5616, "4b80e24aa59dc5878896958a4ae6deae637671f82a745cab97d9a4ada9896bf53fcae361ea89b66a7265b71f695b2cc68daf7ad0196304bed6b7d97d0d03bd3ddf4f8f6b4d9d727ddd3978e33684f31e8747c1f47c75ac335c216b082c0e2aa5ad553c33a0bb0cf85629ccd756be525d14a3a2955cd485b5be47471317f3f7c8777fb3225b41eded6a942fb33280a452e8b2120e6831120db700eea14dc5edf30af21ad06e582334e2adbede666151ea00b2024711e88966d6"}, {0xf8, 0x110, 0x4, "1cf14985b2739632da3d4aa96c9e2246ef11cef3ee1a076f458c1ee399b8a1f94fe99367496ad0d61948bdc07d2e7883632f751146e95ad2e40a8a4752b7e53ef8328c78fb885ab2e2fb82060a0b098059940144e07ec24d1463a9ee4cd125390fb90dd103b291ab250bc92b491d49ae67bdacfe10ffa176bd321e3a3d8cf28f71c1af10da310e88aabd4bc592003d321d9c2a94721e1dfb3481aaaa49dff814d0a106857b83f664b301a62eed76be380bdcc8c1cb4f2b5ca6897c61fe7a9d5fb684777858868c40d5938dfd3ae6e0ab30ab88cf04ba07630bfccb6cd5f9b33873d7b4d92f4f"}, {0xf8, 0x0, 0xc378, "262b74af2dbabf00db4b9dfabdb7eda451cd4522ec163ed9df2b177cd2b0c195b4a7a67c719bb384a23c5c77b388ad9be40eefd21f32b844916d0ea22d3c3822764c3b87e810f21843d767fdca218510188e52edb5445f57236d05bf15c0a3e66e7e1786601ae2987bbae7681bf7b30b45866269c8aff8edf03c678da51faa054c54aae81db93c61e8f266b2f7a0891e12a9d77d16ea0d888bf98dd0210e3c43a89797041013e388d8ba62b11d08b4a7451a5f580dc050f13e44feb21d5527a30e3c6c9c6eb8591f239492333430064ac502b543efaef56e791988364e0f60094ed9"}, {0x18, 0x10b, 0x7, "ad3d32ea998f"}, {0xf8, 0x88, 0x0, "3651ba1ea48f8ad3da260280c3de486ceab4a22b38e47dd1c4d05d545db0d053b805ff00bc44c50e996bca6035201904e667e075c8344cf96524aec2ecd34f6a2fb4774fe9aafce2dd124c88b3e9914284dbfa1689d89e26889b12392a2c61cdd4dbaf5829c55e27d3492b7b486df3b833acf37e24b92784248261d1a94aaed6832367f997636afc2169a948d783a4b0f876f6c34e0a142717963c9f915e04ac9b51736e299df02935fc2806bb177288597bc11e3f2b9ea1101a933d1dd9fe4230df56c80aef08ac2933f95faa4c160164ae014cafd768b6b9b866c1ddcf92a333d5a7c37de43cf2"}, {0x70, 0x103, 0x5, "980bc79a9ee3cc1abc93e823628f24ca39666c443a39c8eb308a49bb6e006b2db56e204bbe7749985f0d5d8ca014bb161048b4b5467b4c622f13d8d52828da4446d5934a4100f57a17fa0bbeef1ebeeecbeb7293a021f2185d219aa1ad"}, {0x98, 0x30c, 0x4, "cbe0479ced84c7261f85c18000266fe74a3e11230aa65fe9c669f442a726cb36991fd806030d06c1625e31be4c088735892ed9ae3bb6e526d2ed30986d108992fd3709ae8077f85ccfce21628cfc7b8aa56d94534c73c0d78748fc62309d56b1ffbcf2b20ff805411a3ae3ea9b4e6d59d15c2121ea9c11dabc210eb44da059c0856ff61a4fb444"}], 0x578}, 0x4002000) close(0xffffffffffffffff) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000013880)={0x0, 0x0, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000149c0)={r4, &(0x7f00000138c0)="19dd6fcf476d8b5693d1c4aa8de72d30a3b882a1efbfd544c261d54b69f9352941d0a92c610b76383a4d94aee5151d8a6bc610c828c59c5cf0d9657b617d933eacc0120b1f89e4cf7564d18739eab1f3ababf94e0c9369cfba03f504becf4c9b3e9bf99d541bde2485c13c44ec7d81b60871592ac063cf2d496a0adb72c49bbdce9bf3d65c71f016d680a8f7046a139c7b6162254728aaade7472245afaf1a994a42d9add8c630aa7d7a8b525aa35def990f9bb966790b343c7a86e9c4dbd6811dc45c59a6dbc53da2dd82ffb8697a3b0669f86e41c2d23217d10258b580d71bac96abaeb9f11ddcb72a1d575d7d974f05e424e0d14551c633", &(0x7f00000139c0)="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", 0x2}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000014a00)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000014a40)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000014a80)='io.max\x00', 0x2, 0x0) socketpair(0x0, 0x6, 0x4, &(0x7f0000014ac0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r7, &(0x7f0000015fc0)={0x0, 0x0, &(0x7f0000014cc0)=[{&(0x7f0000014b00)="a082f6cbb94cd5372f8ec0a1f81724af38e0dfd0af72b2c69367abf81ce70f39226c945f5eff738d865dae5ff26c3299429dc686b0b3bc940511b1a04a17d0b116c453e5c7bc378df22ee80192a56f6377ec335ddef81d46e9c27c9b7964b4e62b46e09d99130d", 0x67}, {&(0x7f0000014b80)="b3f2cfe0cecd83ec46039f83cf150f0da0a6a8d4b781b1ca86ae170404fa4eb7247e596f8302ac3525d21697a0b649d045d55d43d7942d9dd03408cfd3742c4e3318fa30e0b161774e19cf5d85f53bea0a548c9cafdd22cb4e8edfc7ea7c1fad762ed38553fcebfd0bb644bd5130b7b14c624c04b94613bb91b2e67ba6b859f7017ac48cddd2c70bede8e837839d46ab98cb4b8521d0a0e0648fe625f79c886c44469e983017b179b5ccbeafb0c0d8a3745316dd4e207e3e09dab8084ce5069919", 0xc1}, {&(0x7f0000014c80)="c78e23d8eb864300686e9fbb84eadb8b39ec2a42c60cf4ce03957c64656b380541f965e027a458fbe7c250d6b4a77cc192436f67621e22257fac", 0x3a}], 0x3, &(0x7f0000014d00)=[{0x18, 0x107, 0x4, "17"}, {0x1010, 0x113, 0xfff, "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"}, {0x70, 0x29, 0xfd, "2554042cf513f3a4a5c23f515f825079858a564fe982318c451997d093ce1e049b3a954fec2c16cdee3a5a4ecf251689e36ee428b0d147b33687ce6feef732b1caf8e74dd8ed0e3899034846a2f0cb9618cd380254219fff20aed8f53aa81a3a"}, {0x28, 0x104, 0x80, "5162e08dd242c7fcf938a440f82cacde01"}, {0xd8, 0x108, 0x5, "5e57c88b6846c1c9164f088e95cf0c928d5ea0ff1511fc025afc900d4ac50bcec4eace4006b98a62ab88076d5466d0b2015c4c7348fd9c45327529143bd4fba540aa7c369161fc175292857db5f991637cbc998b399988c8bf7e58c654188ed61019e274405c0e902dd483914abd6296d4b54bec65f38187c57d3925253a0a88b4ee5d7e4558402eac45bb6673fa6523b1acd2398839d57cc994e6699d9729bd8e3ae4bd2ef4a4c053c5522bbf81a52b6c42e02cf3e86f2f41f999857d2de843eaeb"}, {0x18, 0x105, 0x0, "ef8c951f7f"}, {0x90, 0x0, 0x4, "db1f50b1d32aebb260fce2394c2b89904a49668ed532ada1de6787a3d8ebf65025b4cd7a1affc568fc85140cac17e429a36bd41c605e9380305ffd8b1654d59ed345ca7d467171cd513f24a061afe654c9c53b0dcf6db58fedd1d202ed39776b8456460510a861d3f8447d2aa08b399f8b99afe85bdd7b70aaa8f93e76725697"}, {0x48, 0x309, 0x9, "0c1eba4ffc2d57fc99cbe107a102cc833101137e268337b6ab65206f6a7fc2b0833d714622494c3d796c48f80deee8f7c95ff117f351cc"}], 0x1288}, 0x800) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000016000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000016300)={&(0x7f0000016040)=@name={0x1e, 0x2, 0x2, {{0x40, 0x4}}}, 0x10, &(0x7f00000161c0)=[{&(0x7f0000016080)="d44eca5aab00a34f023c436bc762fdfdd04381d035fec42adf53a8", 0x1b}, {&(0x7f00000160c0)="b0d90489bfb816c0bdef91fe15534d0f00388329c41aad119a06adba57fb1575ff45a1aa35b4c5cb5ab2c5d3fbfe5275c82c1489101cd48e68c74fa13e34b28fc07b3e687e8eeb4608d50eb1fa7adbc7cce6843d99047246b3a507d9f069c255c57be42c44dd42eea51ada927aadf87cdbb54cf0d99d87139bd1c03ec6a91dfb8535c550009c9408fd4f3fcb2e9d59b19cac4cf17f61c6b015fbf941e43a8899b4cfc9f272fdab75c988743063e8bad672aa926bfac22bb408af314036055e981cbbc32b918ec956719b40af33d3cfb2185e7b137935c8212800ec81dde0d41813794a2c56b02bd5138587fe8f032998d7", 0xf1}], 0x2, &(0x7f0000016200)="f317393a870c3031e72b1a27502990c526fca140a457d23c188fb0eb495e82b7a7fb01acc80aae139328af96cf3d72b55a3a2d69eb9921f34a2e05338021c0fbe687efb70d13c2b6354b7efe59765ef09ff2073b0aa6b628e20c9e8610a0f336f8a8eb0c71d194c60726f2abf689f011b565d0da33d566d67c80162a644f2af7c124b460736c19b71a0fa862307f122be66cf4c82bbf9110c9965672f1b91b9706ac3d69d0478449593ee5ea3c37e6a168bda42c86a6a13a23b0fbef4c449ba2d444245045f0252684c7df1518bd242348742f3440bb50fb86018cef19558f0c9830cc22f4cc", 0xe6, 0x1400c000}, 0x20004008) ioctl$TUNGETFEATURES(r5, 0x800454cf, &(0x7f0000016340)) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000016380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f00000163c0)='cpuacct.usage_user\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000016440)={&(0x7f0000016400)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000165c0)={r10, &(0x7f0000016480)="e6944f2b887ad8c1ed7bdf41c7cec28d4d2107cfeb1ba6e62b3fb949562d7d97487bcf9df82f259db6311b5e4f1696d4bc778a9a5fab4db865db9d6fe7e71316272b2f204e0abfc700d787ed2d62ecf1805ccc0e85debc8d7e6726476718098fd7", &(0x7f0000016500)="902e0074d5bc17ccfec6c35856d1b15a37a9834cb512778242ff24210bcb6f79d1ea13af7149335f970bfd787677d4798878e5c3ea3f2ad86ad31f01a395610896c1aa5b1001f47e82f9188187c1b46a552ba1a12d1b62c0fbdf1c6397fe37c08943fb99b544dd1968647bbdb7ee2e4265b41fc486a1313bb1d0aa7c6925f658e27cf33feb92287a97095d334c1e1033b6e48e9c53e7353a187de9dbcc1281ec01bf8b46099e5b692b8b2996745fdf7c8138a6add47303ddd0cb", 0x5}, 0x20) r11 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000016600)=r11, 0x12) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000016640)='memory.events\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r12, 0x400454d4, &(0x7f0000016680)=0xffff4cc3) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000166c0)={0xffffffffffffffff}) sendmsg$kcm(r13, &(0x7f0000016c40)={0x0, 0x0, &(0x7f0000016900)=[{&(0x7f0000016700)="66ac448b7ae8fd9c63878e314bd5ab2f2007b0e063cef5e0d261df6772a4902f526f5826e30c48492616cd0255608b8650e489a41f9a36138c13a3dac7fe704a9d9a235dab448f85e2c763d41474347d2e9e243cc0868e4b906ff4787ad0015bd7de0afe62e609541d024ed3", 0x6c}, {&(0x7f0000016780)="f1019fc63bea7f548b1476ad0332c9e539f94414cc9257623698899182e31a7c2bf122732b4e78751d0be92366739f404e145abe48b377fdca773bc69b1b6220ea5ed32be222855b508d48fbc55296f0d0f5c06bdfc1eacd77c374bf513b604040", 0x61}, {&(0x7f0000016800)="5a134fe8166ebce5c8bcfa24a90177bd693f3208c31b594c988e5fcf76e845bd4c7c90a001dcf657fd22f11cae6932670f2d3877a405de132cd068a8b05391ebfed5d1167a34ac035dce4305d1ccd739cb3fb2e58bb58ed86902d250dde8b74af595cbf45b604d41fc22a36a4a4d50bb11924cfc22050c706fe94cdd2dd71b0149a4135c9815ba9cdb8ea4a334f2045a3b08bf4c52a4e741a5d2b27985a78df08280a5e62d7529cdbe4d070875a072e9f99a818a51048bee817cbb42cbfce3833fa4fd2b81373b1ef38a7adc2686012468a9d1728e9f", 0xd6}], 0x3, &(0x7f0000016940)=[{0xc0, 0x113, 0x8, "571a2e0e3afd5ca5a61b84141809fc8be9d60d44362908b74a10957c629d1a73ba77f32d99b5aa1ddd3380aca8ffd5ab58464abbdbf5fb73dfb246555ef2a357aff19fe76ccd84901e5bbdf2e419b5a81bca9751563679a429c35c3ea56bedfe0470ff6931baa68647da90744437e7500f6f13f344a8bd31623098ab31c2b8d91a8ad27494ae7754d9f82c4de630411846041e0e44aa9df74caf377e3c2cba73c48d142a0deefdf3b843da1ba67b32"}, {0xe8, 0xff, 0x0, "c43ca2e4bd0afea01eb3844eb34a63e2cbf4ffb3d48ec9ee0d44422b231ed88e585929160893d0951665a766b580ed06df6620412f8334820d499b103367bff80bc5ab3de5ef381d02fe940a25a8d224a2bffa40d8081103751c7ce2701bbe96a7ba4a4f03885016fd4dbb4869f3eef14354a949f4f47ca9520185af7cd02648cf56f3d8f7774ac963306d214f953cc1f40c059d126aa022272d65828730a57b7d2fe8d4079e11f8a9129316a8cc6a751f83c71d6755bb76c8e4bebb6d1be7c708f067cf5887d0677e2cf8bb01a3e2da63a85514"}, {0x20, 0x105, 0x2, "47cbc13de99a62c0e21922fb750c"}, {0x78, 0x102, 0x9, "3218ca6b2857de57a6a30bd4c6197c4d481ce56c2301ba2ab60aa09b766d2470ef8955ad8ced51869b40cb833ef5499f82244f5b863f4dc78923dca9143ba95590f39a23d5174f015d1bddfa6769e543e0cd97c8e5779ed80af4ea0f1fe646a43b8ac2e9"}, {0x90, 0x109, 0x1, "c17dee3f799eea3a2f7823333719a444ea8413a21b893b3dc42436b9ee27d8e8eef220fee18e1f783af7ac4dcfd17b5c82c9ead969f6db45f2195f1db1368226a6c1c1ba50366763de2dd6c0ff9147f1d19287e806ee48bd1f5f177a0a9ce56437da103269f67e74668af81b47b59966a403df17b13a08eeb7748294"}], 0x2d0}, 0x4000000) [ 2518.963883][T22228] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2519.034087][T22305] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2519.041138][T22228] CPU: 0 PID: 22228 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2519.051368][T22228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2519.061432][T22228] Call Trace: [ 2519.064731][T22228] dump_stack+0x172/0x1f0 [ 2519.069070][T22228] dump_header+0x10b/0x82d [ 2519.069084][T22228] ? oom_kill_process+0x94/0x3f0 [ 2519.069105][T22228] oom_kill_process.cold+0x10/0x15 [ 2519.078435][T22228] out_of_memory+0x334/0x1340 [ 2519.078453][T22228] ? lock_downgrade+0x920/0x920 [ 2519.078472][T22228] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2519.078488][T22228] ? oom_killer_disable+0x280/0x280 [ 2519.078519][T22228] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2519.088285][T22228] ? memcg_stat_show+0xc40/0xc40 [ 2519.088308][T22228] ? do_raw_spin_unlock+0x57/0x270 [ 2519.088324][T22228] ? _raw_spin_unlock+0x2d/0x50 [ 2519.088346][T22228] try_charge+0xf4b/0x1440 [ 2519.128896][T22228] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2519.134426][T22228] ? percpu_ref_tryget_live+0x111/0x290 [ 2519.139959][T22228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2519.146188][T22228] ? __kasan_check_read+0x11/0x20 [ 2519.151204][T22228] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2519.156740][T22228] mem_cgroup_try_charge+0x136/0x590 [ 2519.162033][T22228] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2519.167655][T22228] wp_page_copy+0x407/0x1860 [ 2519.172232][T22228] ? find_held_lock+0x35/0x130 [ 2519.176981][T22228] ? do_wp_page+0x53b/0x15c0 [ 2519.181565][T22228] ? pmd_devmap_trans_unstable+0x220/0x220 [ 2519.187356][T22228] ? lock_downgrade+0x920/0x920 [ 2519.192197][T22228] ? swp_swapcount+0x540/0x540 [ 2519.196950][T22228] ? __kasan_check_read+0x11/0x20 [ 2519.201980][T22228] ? do_raw_spin_unlock+0x57/0x270 [ 2519.207084][T22228] do_wp_page+0x543/0x15c0 [ 2519.211493][T22228] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 2519.216881][T22228] __handle_mm_fault+0x23ec/0x4040 [ 2519.221988][T22228] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2519.227521][T22228] ? handle_mm_fault+0x292/0xaa0 [ 2519.232460][T22228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2519.238694][T22228] ? __kasan_check_read+0x11/0x20 [ 2519.243709][T22228] handle_mm_fault+0x3b7/0xaa0 [ 2519.248467][T22228] __do_page_fault+0x536/0xdd0 [ 2519.253227][T22228] do_page_fault+0x38/0x590 [ 2519.257722][T22228] page_fault+0x39/0x40 [ 2519.261864][T22228] RIP: 0033:0x430b36 [ 2519.265748][T22228] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 2519.285340][T22228] RSP: 002b:00007ffd339d9450 EFLAGS: 00010206 [ 2519.291393][T22228] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 2519.299449][T22228] RDX: 0000000001edb930 RSI: 0000000001ee3970 RDI: 0000000000000003 [ 2519.307403][T22228] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001eda940 [ 2519.315357][T22228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 2519.323316][T22228] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 05:52:38 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000002700)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xa}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000000)="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", 0x134}], 0x1}, 0x45) socket$kcm(0x29, 0x0, 0x0) 05:52:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000}, 0x0) [ 2519.700050][T22228] memory: usage 2208kB, limit 0kB, failcnt 475 [ 2519.706483][T22228] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2519.721939][T22228] Memory cgroup stats for /syz4: [ 2519.722056][T22228] anon 8192 [ 2519.722056][T22228] file 49152 [ 2519.722056][T22228] kernel_stack 65536 [ 2519.722056][T22228] slab 2285568 [ 2519.722056][T22228] sock 0 [ 2519.722056][T22228] shmem 221184 [ 2519.722056][T22228] file_mapped 0 [ 2519.722056][T22228] file_dirty 135168 [ 2519.722056][T22228] file_writeback 0 [ 2519.722056][T22228] anon_thp 0 [ 2519.722056][T22228] inactive_anon 135168 [ 2519.722056][T22228] active_anon 8192 [ 2519.722056][T22228] inactive_file 16384 [ 2519.722056][T22228] active_file 12288 [ 2519.722056][T22228] unevictable 0 [ 2519.722056][T22228] slab_reclaimable 1486848 [ 2519.722056][T22228] slab_unreclaimable 798720 [ 2519.722056][T22228] pgfault 258093 [ 2519.722056][T22228] pgmajfault 0 [ 2519.722056][T22228] workingset_refault 0 [ 2519.722056][T22228] workingset_activate 0 [ 2519.722056][T22228] workingset_nodereclaim 0 [ 2519.722056][T22228] pgrefill 1610 [ 2519.722056][T22228] pgscan 7046 [ 2519.722056][T22228] pgsteal 3188 [ 2519.722056][T22228] pgactivate 2805 [ 2519.832400][T22228] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22228,uid=0 05:52:39 executing program 0: socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10610, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x8}, 0x0, 0x0, 0x8, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x2, [@struct={0x10, 0x0, 0x0, 0x4, 0x1, 0x1f}, @union={0x0, 0x6, 0x0, 0x5, 0x1, 0x10001, [{0x8, 0x2, 0x6b5}, {0x7, 0x0, 0x1}, {0x0, 0x2, 0x4}, {}, {0x7}, {0x4, 0x2, 0x3ff}]}]}}, &(0x7f00000017c0)=""/4105, 0x7a, 0x1009, 0xfffffffe}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='cgroup.stat\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f00000004c0)=',vmnet0systemvboxnet0vmnet0\x00'}, 0x30) perf_event_open(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0x6b) getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000000700000025000000000000000022000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r5, r3, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) close(r6) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socketpair(0x2, 0x3, 0x1, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfaD\x00\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) [ 2519.848315][T22228] Memory cgroup out of memory: Killed process 22228 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 2519.866601][ T1071] oom_reaper: reaped process 22228 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 05:52:39 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) 05:52:39 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 05:52:39 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) [ 2521.021063][T22306] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:52:40 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:52:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 05:52:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40070000}, 0x0) [ 2523.161747][T22319] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:52:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4e33d) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2523.477880][T22316] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:52:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x282, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:52:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:52:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44040000}, 0x0) 05:52:43 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4e33e) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:43 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC], 0x14) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x32, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)={0x2, 0x1, [@dev={[], 0x20}]}) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) [ 2524.115796][T22435] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:52:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44050000}, 0x0) 05:52:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:52:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) 05:52:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:52:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) socket$kcm(0xa, 0x922000000003, 0x11) [ 2525.419928][T22445] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2525.776490][T22436] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2526.073349][T22509] IPVS: ftp: loaded support on port[0] = 21 05:52:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x283, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2526.224136][T22512] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2527.207032][T22513] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2527.565545][T22509] chnl_net:caif_netlink_parms(): no params data found [ 2527.692367][T22509] bridge0: port 1(bridge_slave_0) entered blocking state [ 2527.699582][T22509] bridge0: port 1(bridge_slave_0) entered disabled state [ 2527.709502][T22509] device bridge_slave_0 entered promiscuous mode [ 2527.719554][T22509] bridge0: port 2(bridge_slave_1) entered blocking state [ 2527.727373][T22509] bridge0: port 2(bridge_slave_1) entered disabled state [ 2527.737261][T22509] device bridge_slave_1 entered promiscuous mode [ 2527.856732][T22509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2527.870905][T22509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2527.963853][T22509] team0: Port device team_slave_0 added [ 2527.973717][T22509] team0: Port device team_slave_1 added [ 2528.084122][T22509] device hsr_slave_0 entered promiscuous mode [ 2528.141687][T22509] device hsr_slave_1 entered promiscuous mode [ 2528.179974][T22509] debugfs: Directory 'hsr0' with parent '/' already present! [ 2528.282035][T22509] bridge0: port 2(bridge_slave_1) entered blocking state [ 2528.289138][T22509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2528.296555][T22509] bridge0: port 1(bridge_slave_0) entered blocking state [ 2528.303687][T22509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2528.384528][T17863] bridge0: port 1(bridge_slave_0) entered disabled state [ 2528.393403][T17863] bridge0: port 2(bridge_slave_1) entered disabled state [ 2528.548581][T22509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2528.611509][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2528.621318][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2528.677214][T22509] 8021q: adding VLAN 0 to HW filter on device team0 [ 2528.697574][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2528.707998][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2528.717689][T10761] bridge0: port 1(bridge_slave_0) entered blocking state [ 2528.724836][T10761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2528.798010][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2528.810454][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2528.819579][T10760] bridge0: port 2(bridge_slave_1) entered blocking state [ 2528.826749][T10760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2528.852090][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2528.862960][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2528.933284][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2528.944041][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2528.965230][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2528.974593][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2528.985795][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2529.052725][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2529.062545][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2529.078980][T22509] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2529.092777][T22509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2529.104439][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2529.115515][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2529.221677][T22509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2529.643933][T22541] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2529.656902][T22541] CPU: 0 PID: 22541 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2529.664824][T22541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2529.674877][T22541] Call Trace: [ 2529.678173][T22541] dump_stack+0x172/0x1f0 [ 2529.682510][T22541] dump_header+0x10b/0x82d [ 2529.686928][T22541] oom_kill_process.cold+0x10/0x15 [ 2529.692039][T22541] out_of_memory+0x334/0x1340 [ 2529.696770][T22541] ? retint_kernel+0x2b/0x2b [ 2529.701346][T22541] ? oom_killer_disable+0x280/0x280 [ 2529.706531][T22541] ? mem_cgroup_out_of_memory+0x16a/0x240 [ 2529.712284][T22541] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2529.717812][T22541] ? memcg_stat_show+0xc40/0xc40 [ 2529.722744][T22541] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2529.728551][T22541] ? cgroup_file_notify+0x140/0x1b0 [ 2529.733750][T22541] memory_max_write+0x262/0x3a0 [ 2529.738601][T22541] ? mem_cgroup_write+0x370/0x370 [ 2529.743619][T22541] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2529.749065][T22541] cgroup_file_write+0x241/0x790 [ 2529.753986][T22541] ? mem_cgroup_write+0x370/0x370 [ 2529.758995][T22541] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2529.764616][T22541] ? kernfs_ops+0x9f/0x120 [ 2529.769031][T22541] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2529.774646][T22541] kernfs_fop_write+0x2b8/0x480 [ 2529.779485][T22541] __vfs_write+0x8a/0x110 [ 2529.783803][T22541] ? kernfs_fop_open+0xd80/0xd80 [ 2529.788724][T22541] vfs_write+0x268/0x5d0 [ 2529.792950][T22541] ksys_write+0x14f/0x290 [ 2529.797268][T22541] ? __ia32_sys_read+0xb0/0xb0 [ 2529.802027][T22541] ? do_syscall_64+0x26/0x760 [ 2529.806698][T22541] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2529.812754][T22541] ? do_syscall_64+0x26/0x760 [ 2529.817428][T22541] __x64_sys_write+0x73/0xb0 [ 2529.822001][T22541] do_syscall_64+0xfa/0x760 [ 2529.826487][T22541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2529.832359][T22541] RIP: 0033:0x459a59 [ 2529.836232][T22541] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2529.855817][T22541] RSP: 002b:00007fd3bcf49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2529.864221][T22541] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2529.872278][T22541] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 2529.880234][T22541] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2529.888198][T22541] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3bcf4a6d4 [ 2529.896169][T22541] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2529.908108][T22541] memory: usage 4596kB, limit 0kB, failcnt 476 [ 2529.920776][T22541] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2529.929865][T22541] Memory cgroup stats for /syz4: [ 2529.929980][T22541] anon 2109440 [ 2529.929980][T22541] file 49152 [ 2529.929980][T22541] kernel_stack 65536 [ 2529.929980][T22541] slab 2285568 [ 2529.929980][T22541] sock 0 [ 2529.929980][T22541] shmem 221184 [ 2529.929980][T22541] file_mapped 0 [ 2529.929980][T22541] file_dirty 135168 [ 2529.929980][T22541] file_writeback 0 [ 2529.929980][T22541] anon_thp 2097152 [ 2529.929980][T22541] inactive_anon 135168 [ 2529.929980][T22541] active_anon 2109440 [ 2529.929980][T22541] inactive_file 16384 [ 2529.929980][T22541] active_file 12288 [ 2529.929980][T22541] unevictable 0 [ 2529.929980][T22541] slab_reclaimable 1486848 [ 2529.929980][T22541] slab_unreclaimable 798720 [ 2529.929980][T22541] pgfault 258126 [ 2529.929980][T22541] pgmajfault 0 [ 2529.929980][T22541] workingset_refault 0 [ 2529.929980][T22541] workingset_activate 0 [ 2529.929980][T22541] workingset_nodereclaim 0 [ 2529.929980][T22541] pgrefill 1610 [ 2529.929980][T22541] pgscan 7046 [ 2529.929980][T22541] pgsteal 3188 [ 2530.025012][T22541] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22540,uid=0 05:52:49 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:52:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x284, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC], 0x14) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x32, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)={0x2, 0x1, [@dev={[], 0x20}]}) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) 05:52:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 2530.045103][T22541] Memory cgroup out of memory: Killed process 22540 (syz-executor.4) total-vm:72712kB, anon-rss:2188kB, file-rss:35836kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 2530.078910][ T1071] oom_reaper: reaped process 22540 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 05:52:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44060000}, 0x0) 05:52:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf0ffff) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2530.134672][T22509] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2530.145579][T22548] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2530.149344][T22509] CPU: 1 PID: 22509 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2530.162842][T22509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2530.172894][T22509] Call Trace: [ 2530.172915][T22509] dump_stack+0x172/0x1f0 [ 2530.172936][T22509] dump_header+0x10b/0x82d [ 2530.172949][T22509] ? oom_kill_process+0x94/0x3f0 [ 2530.172969][T22509] oom_kill_process.cold+0x10/0x15 [ 2530.180567][T22509] out_of_memory+0x334/0x1340 [ 2530.180584][T22509] ? lock_downgrade+0x920/0x920 [ 2530.180601][T22509] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2530.180615][T22509] ? oom_killer_disable+0x280/0x280 [ 2530.180638][T22509] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2530.180653][T22509] ? memcg_stat_show+0xc40/0xc40 [ 2530.180672][T22509] ? do_raw_spin_unlock+0x57/0x270 [ 2530.180688][T22509] ? _raw_spin_unlock+0x2d/0x50 [ 2530.180705][T22509] try_charge+0xf4b/0x1440 [ 2530.180731][T22509] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2530.180744][T22509] ? percpu_ref_tryget_live+0x111/0x290 [ 2530.180761][T22509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2530.180777][T22509] ? __kasan_check_read+0x11/0x20 [ 2530.180797][T22509] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2530.180817][T22509] mem_cgroup_try_charge+0x136/0x590 [ 2530.180842][T22509] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2530.180862][T22509] wp_page_copy+0x407/0x1860 [ 2530.180876][T22509] ? find_held_lock+0x35/0x130 [ 2530.180889][T22509] ? do_wp_page+0x53b/0x15c0 [ 2530.180906][T22509] ? pmd_devmap_trans_unstable+0x220/0x220 [ 2530.180922][T22509] ? lock_downgrade+0x920/0x920 [ 2530.180940][T22509] ? swp_swapcount+0x540/0x540 [ 2530.180959][T22509] ? __kasan_check_read+0x11/0x20 [ 2530.180976][T22509] ? do_raw_spin_unlock+0x57/0x270 [ 2530.318728][T22509] do_wp_page+0x543/0x15c0 [ 2530.323153][T22509] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 2530.328522][T22509] __handle_mm_fault+0x23ec/0x4040 [ 2530.333628][T22509] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2530.339160][T22509] ? handle_mm_fault+0x292/0xaa0 [ 2530.344103][T22509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2530.350330][T22509] ? __kasan_check_read+0x11/0x20 [ 2530.355345][T22509] handle_mm_fault+0x3b7/0xaa0 [ 2530.360103][T22509] __do_page_fault+0x536/0xdd0 [ 2530.364863][T22509] do_page_fault+0x38/0x590 [ 2530.369356][T22509] page_fault+0x39/0x40 [ 2530.373499][T22509] RIP: 0033:0x430b36 [ 2530.377382][T22509] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 2530.396970][T22509] RSP: 002b:00007ffc41bb70c0 EFLAGS: 00010206 [ 2530.403021][T22509] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 2530.410977][T22509] RDX: 00000000010ed930 RSI: 00000000010f5970 RDI: 0000000000000003 [ 2530.418939][T22509] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000010ec940 [ 2530.426895][T22509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 2530.434852][T22509] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 2530.740240][T22509] memory: usage 2228kB, limit 0kB, failcnt 488 [ 2530.747812][T22509] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2530.791789][T22509] Memory cgroup stats for /syz4: [ 2530.791899][T22509] anon 40960 [ 2530.791899][T22509] file 49152 [ 2530.791899][T22509] kernel_stack 0 [ 2530.791899][T22509] slab 2285568 [ 2530.791899][T22509] sock 0 [ 2530.791899][T22509] shmem 221184 [ 2530.791899][T22509] file_mapped 0 [ 2530.791899][T22509] file_dirty 135168 [ 2530.791899][T22509] file_writeback 0 [ 2530.791899][T22509] anon_thp 0 [ 2530.791899][T22509] inactive_anon 135168 [ 2530.791899][T22509] active_anon 40960 [ 2530.791899][T22509] inactive_file 16384 [ 2530.791899][T22509] active_file 12288 [ 2530.791899][T22509] unevictable 0 [ 2530.791899][T22509] slab_reclaimable 1486848 [ 2530.791899][T22509] slab_unreclaimable 798720 [ 2530.791899][T22509] pgfault 258159 [ 2530.791899][T22509] pgmajfault 0 [ 2530.791899][T22509] workingset_refault 0 [ 2530.791899][T22509] workingset_activate 0 [ 2530.791899][T22509] workingset_nodereclaim 0 [ 2530.791899][T22509] pgrefill 1610 [ 2530.791899][T22509] pgscan 7046 [ 2530.791899][T22509] pgsteal 3188 [ 2530.791899][T22509] pgactivate 2805 05:52:50 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) [ 2531.072948][T22509] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22509,uid=0 05:52:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x1000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2531.170319][T22509] Memory cgroup out of memory: Killed process 22509 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 2531.245714][ T1071] oom_reaper: reaped process 22509 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 05:52:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) 05:52:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:52:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x440c0000}, 0x0) [ 2531.718459][T22601] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2531.754041][T22601] CPU: 1 PID: 22601 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 2531.762005][T22601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2531.772153][T22601] Call Trace: [ 2531.775451][T22601] dump_stack+0x172/0x1f0 [ 2531.779793][T22601] dump_header+0x10b/0x82d [ 2531.784225][T22601] oom_kill_process.cold+0x10/0x15 [ 2531.789338][T22601] out_of_memory+0x334/0x1340 [ 2531.794023][T22601] ? retint_kernel+0x2b/0x2b [ 2531.798618][T22601] ? oom_killer_disable+0x280/0x280 [ 2531.803843][T22601] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2531.809403][T22601] ? memcg_stat_show+0xc40/0xc40 [ 2531.814367][T22601] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2531.820191][T22601] ? cgroup_file_notify+0x140/0x1b0 [ 2531.825408][T22601] memory_max_write+0x262/0x3a0 [ 2531.830273][T22601] ? mem_cgroup_write+0x370/0x370 [ 2531.835313][T22601] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2531.840783][T22601] cgroup_file_write+0x241/0x790 [ 2531.845734][T22601] ? mem_cgroup_write+0x370/0x370 [ 2531.850771][T22601] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2531.856418][T22601] ? kernfs_ops+0x9f/0x120 [ 2531.860849][T22601] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2531.866487][T22601] kernfs_fop_write+0x2b8/0x480 [ 2531.871346][T22601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2531.877603][T22601] __vfs_write+0x8a/0x110 [ 2531.881937][T22601] ? kernfs_fop_open+0xd80/0xd80 [ 2531.886881][T22601] vfs_write+0x268/0x5d0 [ 2531.891132][T22601] ksys_write+0x14f/0x290 [ 2531.895466][T22601] ? __ia32_sys_read+0xb0/0xb0 [ 2531.900356][T22601] __x64_sys_write+0x73/0xb0 [ 2531.904957][T22601] ? do_syscall_64+0xea/0x760 [ 2531.909642][T22601] do_syscall_64+0xfa/0x760 [ 2531.914269][T22601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2531.920158][T22601] RIP: 0033:0x459a59 [ 2531.924061][T22601] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2531.943676][T22601] RSP: 002b:00007f7cd8573c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2531.952090][T22601] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2531.960056][T22601] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 2531.968017][T22601] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2531.975984][T22601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7cd85746d4 [ 2531.983962][T22601] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2532.011517][T22601] memory: usage 7268kB, limit 0kB, failcnt 55 [ 2532.017981][T22601] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2532.033497][T22601] Memory cgroup stats for /syz0: [ 2532.033808][T22601] anon 2281472 [ 2532.033808][T22601] file 114688 [ 2532.033808][T22601] kernel_stack 65536 [ 2532.033808][T22601] slab 4759552 [ 2532.033808][T22601] sock 0 [ 2532.033808][T22601] shmem 0 [ 2532.033808][T22601] file_mapped 0 [ 2532.033808][T22601] file_dirty 135168 [ 2532.033808][T22601] file_writeback 0 [ 2532.033808][T22601] anon_thp 2097152 [ 2532.033808][T22601] inactive_anon 0 [ 2532.033808][T22601] active_anon 2203648 [ 2532.033808][T22601] inactive_file 49152 [ 2532.033808][T22601] active_file 0 [ 2532.033808][T22601] unevictable 0 [ 2532.033808][T22601] slab_reclaimable 3108864 [ 2532.033808][T22601] slab_unreclaimable 1650688 [ 2532.033808][T22601] pgfault 189255 [ 2532.033808][T22601] pgmajfault 0 [ 2532.033808][T22601] workingset_refault 0 [ 2532.033808][T22601] workingset_activate 0 [ 2532.033808][T22601] workingset_nodereclaim 0 [ 2532.033808][T22601] pgrefill 35 [ 2532.033808][T22601] pgscan 365 [ 2532.033808][T22601] pgsteal 246 [ 2532.033808][T22601] pgactivate 66 [ 2532.144981][T22601] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=22596,uid=0 [ 2532.172472][T22601] Memory cgroup out of memory: Killed process 22596 (syz-executor.0) total-vm:72708kB, anon-rss:2204kB, file-rss:35848kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 2532.264862][ T1071] oom_reaper: reaped process 22596 (syz-executor.0), now anon-rss:0kB, file-rss:34976kB, shmem-rss:0kB 05:52:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44060000}, 0x0) [ 2532.338820][T17014] syz-executor.0 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 2532.392004][T17014] CPU: 0 PID: 17014 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 2532.399935][T17014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2532.409991][T17014] Call Trace: [ 2532.413292][T17014] dump_stack+0x172/0x1f0 [ 2532.417628][T17014] dump_header+0x10b/0x82d [ 2532.422049][T17014] ? oom_kill_process+0x94/0x3f0 [ 2532.426992][T17014] oom_kill_process.cold+0x10/0x15 [ 2532.432112][T17014] out_of_memory+0x334/0x1340 [ 2532.436792][T17014] ? lock_downgrade+0x920/0x920 [ 2532.441638][T17014] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2532.447605][T17014] ? oom_killer_disable+0x280/0x280 [ 2532.452810][T17014] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2532.458339][T17014] ? memcg_stat_show+0xc40/0xc40 [ 2532.463259][T17014] ? do_raw_spin_unlock+0x57/0x270 [ 2532.468361][T17014] ? _raw_spin_unlock+0x2d/0x50 [ 2532.473197][T17014] try_charge+0xf4b/0x1440 [ 2532.477603][T17014] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2532.483133][T17014] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2532.488658][T17014] ? cache_grow_begin+0x122/0xd20 [ 2532.493662][T17014] ? find_held_lock+0x35/0x130 [ 2532.498439][T17014] ? cache_grow_begin+0x122/0xd20 [ 2532.503460][T17014] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2532.508992][T17014] ? lock_downgrade+0x920/0x920 [ 2532.513821][T17014] ? memcg_kmem_put_cache+0x50/0x50 [ 2532.519085][T17014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2532.525436][T17014] ? __kasan_check_read+0x11/0x20 [ 2532.530440][T17014] cache_grow_begin+0x629/0xd20 [ 2532.535278][T17014] ? __sanitizer_cov_trace_cmp4+0x11/0x20 [ 2532.540982][T17014] ? mempolicy_slab_node+0x139/0x390 [ 2532.546254][T17014] fallback_alloc+0x1fd/0x2d0 [ 2532.550920][T17014] ____cache_alloc_node+0x1bc/0x1d0 [ 2532.556112][T17014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2532.562437][T17014] kmem_cache_alloc+0x1ef/0x710 [ 2532.567269][T17014] alloc_inode+0x16f/0x1e0 [ 2532.571676][T17014] iget_locked+0x1a6/0x4b0 [ 2532.576074][T17014] kernfs_get_inode+0x4e/0x580 [ 2532.580841][T17014] kernfs_iop_lookup+0x1ab/0x230 [ 2532.585759][T17014] __lookup_slow+0x279/0x500 [ 2532.590343][T17014] ? vfs_unlink+0x620/0x620 [ 2532.594839][T17014] lookup_slow+0x58/0x80 [ 2532.599063][T17014] path_mountpoint+0x5d2/0x1e60 [ 2532.603919][T17014] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2532.609442][T17014] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2532.615419][T17014] ? path_openat+0x46d0/0x46d0 [ 2532.620168][T17014] filename_mountpoint+0x18e/0x390 [ 2532.625259][T17014] ? filename_parentat.isra.0+0x410/0x410 [ 2532.630956][T17014] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2532.637091][T17014] ? __phys_addr_symbol+0x30/0x70 [ 2532.642100][T17014] ? __check_object_size+0x3d/0x437 [ 2532.647279][T17014] ? strncpy_from_user+0x2b4/0x400 [ 2532.652372][T17014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2532.658590][T17014] ? getname_flags+0x277/0x5b0 [ 2532.663336][T17014] user_path_mountpoint_at+0x3a/0x50 [ 2532.668601][T17014] ksys_umount+0x164/0xf00 [ 2532.672996][T17014] ? __ia32_sys_rmdir+0x40/0x40 [ 2532.677824][T17014] ? __detach_mounts+0x2a0/0x2a0 [ 2532.682740][T17014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2532.688974][T17014] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2532.694410][T17014] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2532.699862][T17014] ? do_syscall_64+0x26/0x760 [ 2532.704519][T17014] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2532.710560][T17014] ? do_syscall_64+0x26/0x760 [ 2532.715218][T17014] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2532.720489][T17014] __x64_sys_umount+0x54/0x80 [ 2532.725154][T17014] do_syscall_64+0xfa/0x760 [ 2532.729635][T17014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2532.735504][T17014] RIP: 0033:0x45c487 [ 2532.739377][T17014] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2532.758985][T17014] RSP: 002b:00007ffcfb35f628 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 2532.767395][T17014] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c487 [ 2532.775364][T17014] RDX: 0000000000403550 RSI: 0000000000000002 RDI: 00007ffcfb35f6d0 [ 2532.783316][T17014] RBP: 0000000000000250 R08: 0000000000000000 R09: 0000000000000010 [ 2532.791268][T17014] R10: 000000000000000a R11: 0000000000000206 R12: 00007ffcfb360760 [ 2532.799217][T17014] R13: 0000000002683940 R14: 0000000000000000 R15: 00007ffcfb360760 [ 2532.812672][T17014] memory: usage 4884kB, limit 0kB, failcnt 67 [ 2532.818780][T17014] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2532.837233][T17014] Memory cgroup stats for /syz0: [ 2532.837543][T17014] anon 163840 [ 2532.837543][T17014] file 114688 [ 2532.837543][T17014] kernel_stack 65536 [ 2532.837543][T17014] slab 4759552 [ 2532.837543][T17014] sock 0 [ 2532.837543][T17014] shmem 0 [ 2532.837543][T17014] file_mapped 0 [ 2532.837543][T17014] file_dirty 135168 [ 2532.837543][T17014] file_writeback 0 [ 2532.837543][T17014] anon_thp 0 [ 2532.837543][T17014] inactive_anon 0 [ 2532.837543][T17014] active_anon 86016 [ 2532.837543][T17014] inactive_file 49152 [ 2532.837543][T17014] active_file 0 [ 2532.837543][T17014] unevictable 0 [ 2532.837543][T17014] slab_reclaimable 3108864 [ 2532.837543][T17014] slab_unreclaimable 1650688 [ 2532.837543][T17014] pgfault 189288 [ 2532.837543][T17014] pgmajfault 0 [ 2532.837543][T17014] workingset_refault 0 [ 2532.837543][T17014] workingset_activate 0 [ 2532.837543][T17014] workingset_nodereclaim 0 [ 2532.837543][T17014] pgrefill 35 [ 2532.837543][T17014] pgscan 365 [ 2532.837543][T17014] pgsteal 246 [ 2532.837543][T17014] pgactivate 66 [ 2532.934110][T17014] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=17014,uid=0 [ 2532.950739][T17014] Memory cgroup out of memory: Killed process 17014 (syz-executor.0) total-vm:72444kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 2532.991879][ T1071] oom_reaper: reaped process 17014 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 05:52:52 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:52:52 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2533.048457][T22555] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:52:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x440d0000}, 0x0) 05:52:52 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:52:52 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) [ 2533.974560][T22603] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:52:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x285, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2534.491027][T22607] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2534.910937][T22670] IPVS: ftp: loaded support on port[0] = 21 [ 2534.944908][T22656] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:52:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x2000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44060000}, 0x0) 05:52:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0x0) 05:52:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:52:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:52:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:52:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2535.674226][T22689] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:52:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x286, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:52:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48010000}, 0x0) [ 2536.350104][T22713] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2537.001726][T22738] IPVS: ftp: loaded support on port[0] = 21 [ 2537.031535][T22690] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2537.408025][T22670] chnl_net:caif_netlink_parms(): no params data found [ 2537.485895][T22717] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2537.852694][T22670] bridge0: port 1(bridge_slave_0) entered blocking state [ 2537.860624][T22670] bridge0: port 1(bridge_slave_0) entered disabled state [ 2537.871081][T22670] device bridge_slave_0 entered promiscuous mode [ 2537.882326][T22670] bridge0: port 2(bridge_slave_1) entered blocking state [ 2537.889479][T22670] bridge0: port 2(bridge_slave_1) entered disabled state [ 2537.899536][T22670] device bridge_slave_1 entered promiscuous mode [ 2538.092677][T22670] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2538.111867][T22738] chnl_net:caif_netlink_parms(): no params data found [ 2538.125354][T22670] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2538.217722][T22670] team0: Port device team_slave_0 added [ 2538.296430][T22670] team0: Port device team_slave_1 added [ 2538.312014][T22738] bridge0: port 1(bridge_slave_0) entered blocking state [ 2538.319192][T22738] bridge0: port 1(bridge_slave_0) entered disabled state [ 2538.329052][T22738] device bridge_slave_0 entered promiscuous mode [ 2538.357260][T22738] bridge0: port 2(bridge_slave_1) entered blocking state [ 2538.366000][T22738] bridge0: port 2(bridge_slave_1) entered disabled state [ 2538.377992][T22738] device bridge_slave_1 entered promiscuous mode [ 2538.445836][T22670] device hsr_slave_0 entered promiscuous mode [ 2538.501351][T22670] device hsr_slave_1 entered promiscuous mode [ 2538.659945][T22670] debugfs: Directory 'hsr0' with parent '/' already present! [ 2538.763699][T22738] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2538.931404][T22738] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2539.045866][T22738] team0: Port device team_slave_0 added [ 2539.065978][T22738] team0: Port device team_slave_1 added [ 2539.241785][T22738] device hsr_slave_0 entered promiscuous mode [ 2539.281255][T22738] device hsr_slave_1 entered promiscuous mode [ 2539.320093][T22738] debugfs: Directory 'hsr0' with parent '/' already present! [ 2539.334590][T22670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2539.459503][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2539.469199][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2539.484961][T22670] 8021q: adding VLAN 0 to HW filter on device team0 [ 2539.574280][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2539.585113][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2539.595047][T10761] bridge0: port 1(bridge_slave_0) entered blocking state [ 2539.602172][T10761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2539.675745][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2539.687153][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2539.697569][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2539.707245][T10760] bridge0: port 2(bridge_slave_1) entered blocking state [ 2539.714367][T10760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2539.741182][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2539.833399][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2539.844511][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2539.855131][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2539.893422][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2539.902980][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2539.914590][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2539.926181][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2539.936896][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2540.016448][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2540.026645][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2540.044265][T22670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2540.225517][T22738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2540.248695][T22670] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2540.273588][T22738] 8021q: adding VLAN 0 to HW filter on device team0 [ 2540.282225][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2540.294982][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2540.404206][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2540.421825][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2540.434388][T10760] bridge0: port 1(bridge_slave_0) entered blocking state [ 2540.441531][T10760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2540.474466][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2540.484532][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2540.495050][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2540.504825][T10761] bridge0: port 2(bridge_slave_1) entered blocking state [ 2540.511941][T10761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2540.648317][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2540.689002][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2540.776476][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2540.789699][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2540.807645][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2540.831232][T22759] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2540.847657][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2540.873864][T22759] CPU: 0 PID: 22759 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2540.881808][T22759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2540.891867][T22759] Call Trace: [ 2540.895169][T22759] dump_stack+0x172/0x1f0 [ 2540.899503][T22759] dump_header+0x10b/0x82d [ 2540.903934][T22759] oom_kill_process.cold+0x10/0x15 [ 2540.909047][T22759] out_of_memory+0x334/0x1340 [ 2540.913731][T22759] ? cgroup_file_notify+0x140/0x1b0 [ 2540.918966][T22759] ? oom_killer_disable+0x280/0x280 [ 2540.924195][T22759] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2540.929741][T22759] ? memcg_stat_show+0xc40/0xc40 [ 2540.934706][T22759] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2540.940525][T22759] ? cgroup_file_notify+0x140/0x1b0 [ 2540.945730][T22759] memory_max_write+0x262/0x3a0 [ 2540.950584][T22759] ? mem_cgroup_write+0x370/0x370 [ 2540.955607][T22759] ? lock_acquire+0x190/0x410 [ 2540.960284][T22759] ? kernfs_fop_write+0x227/0x480 [ 2540.965314][T22759] cgroup_file_write+0x241/0x790 [ 2540.970267][T22759] ? mem_cgroup_write+0x370/0x370 [ 2540.975295][T22759] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2540.980952][T22759] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2540.986583][T22759] kernfs_fop_write+0x2b8/0x480 [ 2540.991438][T22759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2540.997676][T22759] __vfs_write+0x8a/0x110 [ 2541.002005][T22759] ? kernfs_fop_open+0xd80/0xd80 [ 2541.006946][T22759] vfs_write+0x268/0x5d0 [ 2541.011201][T22759] ksys_write+0x14f/0x290 [ 2541.015530][T22759] ? __ia32_sys_read+0xb0/0xb0 [ 2541.020293][T22759] ? do_syscall_64+0x26/0x760 [ 2541.024970][T22759] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2541.031035][T22759] ? do_syscall_64+0x26/0x760 [ 2541.035715][T22759] __x64_sys_write+0x73/0xb0 [ 2541.040308][T22759] do_syscall_64+0xfa/0x760 [ 2541.044821][T22759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2541.050712][T22759] RIP: 0033:0x459a59 [ 2541.054604][T22759] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2541.074554][T22759] RSP: 002b:00007f6408d34c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2541.082964][T22759] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2541.090939][T22759] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 2541.098907][T22759] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2541.106879][T22759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6408d356d4 [ 2541.114845][T22759] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2541.127402][T22759] memory: usage 4644kB, limit 0kB, failcnt 489 [ 2541.134000][T22759] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2541.141743][T22759] Memory cgroup stats for /syz4: [ 2541.141867][T22759] anon 2179072 [ 2541.141867][T22759] file 49152 [ 2541.141867][T22759] kernel_stack 65536 [ 2541.141867][T22759] slab 2285568 [ 2541.141867][T22759] sock 0 [ 2541.141867][T22759] shmem 221184 [ 2541.141867][T22759] file_mapped 0 [ 2541.141867][T22759] file_dirty 135168 [ 2541.141867][T22759] file_writeback 0 [ 2541.141867][T22759] anon_thp 2097152 [ 2541.141867][T22759] inactive_anon 135168 [ 2541.141867][T22759] active_anon 2179072 [ 2541.141867][T22759] inactive_file 16384 [ 2541.141867][T22759] active_file 12288 [ 2541.141867][T22759] unevictable 0 [ 2541.141867][T22759] slab_reclaimable 1486848 [ 2541.141867][T22759] slab_unreclaimable 798720 [ 2541.141867][T22759] pgfault 258225 [ 2541.141867][T22759] pgmajfault 0 [ 2541.141867][T22759] workingset_refault 0 [ 2541.141867][T22759] workingset_activate 0 [ 2541.141867][T22759] workingset_nodereclaim 0 [ 2541.141867][T22759] pgrefill 1610 [ 2541.141867][T22759] pgscan 7046 [ 2541.141867][T22759] pgsteal 3188 [ 2541.254460][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2541.261903][T22759] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22758,uid=0 [ 2541.282487][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2541.292297][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2541.301025][T22759] Memory cgroup out of memory: Killed process 22758 (syz-executor.4) total-vm:72712kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 2541.339575][ T1071] oom_reaper: reaped process 22758 (syz-executor.4), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB [ 2541.366095][T22738] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2541.382956][T22738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 05:53:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48020000}, 0x0) 05:53:00 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x3000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2541.398337][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2541.409139][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2541.470673][T22670] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2541.531402][T22766] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2541.545658][T22670] CPU: 0 PID: 22670 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2541.553593][T22670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2541.563654][T22670] Call Trace: [ 2541.566954][T22670] dump_stack+0x172/0x1f0 [ 2541.571300][T22670] dump_header+0x10b/0x82d [ 2541.575720][T22670] ? oom_kill_process+0x94/0x3f0 [ 2541.580658][T22670] oom_kill_process.cold+0x10/0x15 [ 2541.585769][T22670] out_of_memory+0x334/0x1340 [ 2541.590444][T22670] ? lock_downgrade+0x920/0x920 [ 2541.595389][T22670] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2541.601206][T22670] ? oom_killer_disable+0x280/0x280 [ 2541.606421][T22670] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2541.611972][T22670] ? memcg_stat_show+0xc40/0xc40 [ 2541.616916][T22670] ? do_raw_spin_unlock+0x57/0x270 [ 2541.622033][T22670] ? _raw_spin_unlock+0x2d/0x50 [ 2541.626890][T22670] try_charge+0xf4b/0x1440 [ 2541.631314][T22670] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2541.636854][T22670] ? percpu_ref_tryget_live+0x111/0x290 [ 2541.642401][T22670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2541.642419][T22670] ? __kasan_check_read+0x11/0x20 [ 2541.642440][T22670] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2541.659226][T22670] mem_cgroup_try_charge+0x136/0x590 [ 2541.659252][T22670] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2541.659271][T22670] wp_page_copy+0x407/0x1860 [ 2541.659291][T22670] ? find_held_lock+0x35/0x130 [ 2541.674766][T22670] ? do_wp_page+0x53b/0x15c0 [ 2541.674785][T22670] ? pmd_devmap_trans_unstable+0x220/0x220 [ 2541.674804][T22670] ? lock_downgrade+0x920/0x920 [ 2541.674823][T22670] ? swp_swapcount+0x540/0x540 [ 2541.674846][T22670] ? __kasan_check_read+0x11/0x20 [ 2541.674860][T22670] ? do_raw_spin_unlock+0x57/0x270 [ 2541.674879][T22670] do_wp_page+0x543/0x15c0 [ 2541.674900][T22670] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 2541.674924][T22670] __handle_mm_fault+0x23ec/0x4040 [ 2541.674944][T22670] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2541.690073][T22670] ? handle_mm_fault+0x292/0xaa0 [ 2541.690103][T22670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2541.690118][T22670] ? __kasan_check_read+0x11/0x20 [ 2541.690136][T22670] handle_mm_fault+0x3b7/0xaa0 [ 2541.690156][T22670] __do_page_fault+0x536/0xdd0 [ 2541.690180][T22670] do_page_fault+0x38/0x590 [ 2541.690198][T22670] page_fault+0x39/0x40 [ 2541.690214][T22670] RIP: 0033:0x430b36 [ 2541.699803][T22670] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 2541.699812][T22670] RSP: 002b:00007fffdff6c1c0 EFLAGS: 00010206 [ 2541.699824][T22670] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 2541.699837][T22670] RDX: 000000000126c930 RSI: 0000000001274970 RDI: 0000000000000003 [ 2541.699844][T22670] RBP: 0000000000008041 R08: 0000000000000001 R09: 000000000126b940 [ 2541.699851][T22670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 2541.699860][T22670] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 2541.713541][T22738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2541.813610][T22670] memory: usage 2268kB, limit 0kB, failcnt 501 [ 2541.926074][T22670] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2541.933690][T22670] Memory cgroup stats for /syz4: [ 2541.933796][T22670] anon 61440 [ 2541.933796][T22670] file 49152 [ 2541.933796][T22670] kernel_stack 0 [ 2541.933796][T22670] slab 2285568 [ 2541.933796][T22670] sock 0 [ 2541.933796][T22670] shmem 221184 [ 2541.933796][T22670] file_mapped 0 [ 2541.933796][T22670] file_dirty 135168 [ 2541.933796][T22670] file_writeback 0 [ 2541.933796][T22670] anon_thp 0 [ 2541.933796][T22670] inactive_anon 135168 [ 2541.933796][T22670] active_anon 61440 [ 2541.933796][T22670] inactive_file 16384 [ 2541.933796][T22670] active_file 12288 [ 2541.933796][T22670] unevictable 0 [ 2541.933796][T22670] slab_reclaimable 1486848 [ 2541.933796][T22670] slab_unreclaimable 798720 [ 2541.933796][T22670] pgfault 258225 [ 2541.933796][T22670] pgmajfault 0 [ 2541.933796][T22670] workingset_refault 0 [ 2541.933796][T22670] workingset_activate 0 [ 2541.933796][T22670] workingset_nodereclaim 0 [ 2541.933796][T22670] pgrefill 1610 [ 2541.933796][T22670] pgscan 7079 [ 2541.933796][T22670] pgsteal 3188 [ 2541.933796][T22670] pgactivate 2805 [ 2541.938764][T22670] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22670,uid=0 [ 2542.100159][T22670] Memory cgroup out of memory: Killed process 22670 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 2542.130958][ T1071] oom_reaper: reaped process 22670 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2542.808006][T22768] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:02 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:02 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:53:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x287, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48090000}, 0x0) 05:53:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2543.284095][T22803] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x3}, 0xc01}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000140)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000200)=0xa7) r4 = gettid() perf_event_open(&(0x7f0000000540)={0x5, 0x70, 0x8, 0x2, 0x81, 0x11, 0x0, 0x40, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xe52c, 0x0, @perf_config_ext={0x0, 0x401}, 0x100, 0x4a86, 0x7, 0x7, 0x2, 0x753, 0x9}, r4, 0x1, 0xffffffffffffffff, 0xc) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000080)=0xffff, 0xffffff43) r6 = gettid() r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r7, 0x0, 0x1e, &(0x7f0000000240)='{nodev+em0ppp0trustedbdeveth0\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xfffffffffffffd64, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x6, 0x2003}, 0x0, 0x0, &(0x7f0000000640)={0x1, 0x0, 0x1, 0x8}, &(0x7f0000000480)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={r8, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000580)='memory.events\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000240)='pids.events\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r4, r5, 0x0, 0x1b, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', r10}, 0x30) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x3e, 0x1, 0x0, 0x1, 0x0, 0x9, 0x2e040, 0xc48b15b72113e105, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={&(0x7f0000000180), 0xfe77c41e1e4b0510}, 0x20a15, 0x8ce, 0x1, 0x9, 0x80000000, 0x3, 0x4}, r4, 0x4, 0xffffffffffffffff, 0x8) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) write$cgroup_subtree(r1, &(0x7f0000002d40)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="d55794f0f58b3e8edd8542ddad9360809d55eecadac48d0b26c8fbbb78a28cf407e0ae6a3798f6f4cfe3565c1b9b877f024e6db94c09922f3494f5ed78f45ccf945ba0ee51643ef4f49f7989d791bd37b9a6029ee313870ae7120c8f2d8188e125a87f06ca38983687738c770fdb6477ce3a12d9ebb5cde90983b68b5f205d4a3925dbb13839f364475ba4125223179c6e0a04047208008254ccb15e96bb4db70be4def6a2efdd77f4a3ae17bae5fd82a3b8c7ce208329e4423e6d9fc492b4959161a12959a974df7e61a061dc115c93e68b867d1f175b98eb620f269f451579ee10aaa5e92b3b4d1fe6205ec06a9cc3d35ce36e82a563bb6a2ca1c64efc510c996571c880ca1eda3a9d4c45aa231573be27c3f9ca61c66b21b316e06b202a906b598777884d7f5f8287e1a8b2800c81bbab484651a579fad347ef24fb335b2f260669783d4e64fd7b50998c90873cb105cb78b3c29191227ae607e2945f03ce24c8d675b2126f72826848097f29ca4acc46f4f27df002fd4d565a89b5621c1c739f600f30f0497298aad1b08e82a76e533456637b0c2e57f8ba3c97da224026851eafb07d4fef7f7f505d93e3e8715dd001305fd88d379dbdf463cc432da5f982df813ab4c08ec226d4f8b490afd8237dfedde1703faf685762b7935a9ae6e0de00d86f9d33cb50ee8f04881c77808d2ed7606a4927a20e290e177139eb917ba5c8c62cbbdcf205a3c5c94424b2b7fd4cfffa4aebb97367e56113cc145e08fc8c846fa46ea9e6aed03c8bd4ca657c8380672621fed957616196aba05d3720d85fd126cc357f83699c94039dc191e8aed3a8a38495ef482986ed6ed58cb246120899bb6d3f00206fa7bcc4b575f5e0a1231393b03a401d953a7d23c1ac0b1ed22b7ab12c8a74e5d2e1a3b375253ce21e6ae058ac19c21f7d068d9749a4eb523bcaf423a8c8b90022f671441329975afacd88bc93c3055ad6918cdf8b156bca96065008fb9871c3be104a6b73a8a8a4733394b86cef81aa9845dc6058d5eefa124858af151a63a3f6c4fb7409b7723755ebe2044b67fdb5201da0ee9a446a2f8b710cce0359269f96b1d826d256376d34346d97e6afe5c1344311658ed7d947495eee2853f45f99f2c886c2f0dd70f1ee8813018fbcc941d110e0622a1adfde6a942a0c0f4d3a26774881f56b0afafbf4354240a971993aee963d5a5299139e82134571234eb4ca83c7d23218f8a1260539cc9385ce056c4123bd9c2fd6a0854cfbab8a1bfeb99f9f1d1b26d641b88dda7d73c103d1046eb819d1c8afa9806c0925d35896fb7dc09bcea01927d1e19c570642a8e53a59db7a08fd53d8732c657fc2a3fd6fa53377dd3eda965fb4e0b596ddfa4285eb9b6f11156bd320d6c4c4181293a4e95c38f44342178defdb7c5c4e479fbb2a2148ba9bb100934e2cf899bd749a93829a567c35707a33d183b5c7ff8da26ca79090c45c8a15a46900fb30f014b5a74b792bc13d49b34ea73ea7e8093cc5f53eaffdc4473bcf9893a3c8f15580191d8ac451d0ee60839fc2871a2f6115687ea29a6d0c42f4945536ef484f8560f22e569b75a1bdfb6efb86639eddb35f817f045110ea810e905cddc21bafe4db9f4777009db389a870012eb5b43c7eae926694522405b321cd89f4561b0036c8bc840e6191ecaba440f782556e0a4c1d6e8941922f3fb1c958ee8644a747883c75a6da18f3a5f1c1b0e8e65ac98337cdb3c9cd53cd8992555437b0c2c9b25a629b426ad3b2e1118e27ccf9d06d50b4c9e1f85db8e32ef96a40beac7cb6fbd0da6031da2db827426a4883e4226bb00df514bce686f26645312d5687f52d0ec15005483d4d4bcd50969d0418544fd5a7f6884c11a46f6485cc2196cd51d7edc469959ae339c2461df751eafb36998cedca89d090c2193cb2f3abea9c78a837cf4fb0ace8d125df1910f7ee7bd586fa28ab324966c4d0aa0e54e21ee04798e2ef1816d019cf9a6fd9aa6284bb76b5e435a7cb7cb769ef25c68b372dcb6f87c41ce1d9ac4673bdb830bf301ac31ace63822c33c67e0956c72feb4eb190bc430448a66f079cdf14438522eca7a350c76f1abb556e47001d2c7285467eee529cec40d3fc896a53a0c8341d7153f14f62e6ce8139dcfbf7ad3055d392f8d1688886217c798a79c9c2090251013c3b6c17849cea0232137785be69eb4f82ddbf9c74ae61cd88e94b05b40a43a0d38affd26ce857afba29f3e429c8921b899f876564407a175e11d6bd81f82ab57ecfc2941a0451597017408709e5d8227232b6d24b8d8018b6c8297f8ed74676464119ad18b103213361b0d1b38185b8887e40321110cc15324597b5e45fb69f895d872fa11eb40e2c085610e1aba842f52784680b654fc556400939dd864a2afab5e59fe8da855f7b46b480ffadc514670a0c6a53c4745b8a62f4aa13c39ee6d4142e9af764c9257459adca9651157ec96abf00ac4ab902cc6ee5b4a7d5e3877534a28f1a9bd33a91db8e5853e901a666a90c5099ae8a05473e8de459d495ca144d3f72d5a49006ba1ca80973d25a408780e3b4a0c11190dc4a071d77801ad335dda742d441612a9adcb6d4980a5e7b509653b12dcf839a198edbd4f6b8ef5f155a0cd8192e21737417f404b6ec39e861fb85bd65f46483339ecf67ca732d5c06949e67df40a23dff3dbb8fc5bf059cfe3b6f276e68b74c5e80ad7e21491f8ad0dcce15d908991926d7b4fb3ab1814d6cdb3475f40bb44ff166ca9c2dd9fc933e2bc11155d5ef2055185a46ecd13135c7725d1c6f388a31484d6c949910a5b3903d910792fff6bec14f339eb967a5bcc71cac11890f52227ec0f31ca340b3993a401fa335531636ba355d0b7a320c1052e4bb66abfb747f8104994789121a1c69807770d2c5e25184519455134423465bd19143ba7b1498a39a31eb8e96bf01e3d84752cf5b167fd8dd67338ffdc799c188799483a73deb95ee7c7f09b57cb16ca0f83980ae086096113b0c29c94ae8307de293f996a7acec3ed9fd0708ee7524ce130a5a50f69797aa248ed1b5c2b03ac6311216400d2a274b436f990960d826fd0ddb10c61772755165d646b365a82957413356541ff82afc9436f46567001c2f704e79ea64256732edd48206fb6fc6f4fd0c9ed5eea5e97e98e81d32487876e12075ce7259bd93f81e1f151fc82e32d070a3175f142803580418fe70072f1a4f4c4e2f3e1d7f2bd5d1d5c84c83a8c1bea82b0984196d77c36f3b92c55d07c53883a340305bf0c5358598f54e27822676ebcb3447206cb378fba819b12bf75b8a6c88a784a189f15065c83da315886ba2d8f39d895ee3eebe910e0872843ccd6317932f56e1cec72446cf680a5ce25b79f191ce0ab4509f24f595e1be945f366fefb8388a9c62c895474dd0614875f50883b3cb6be1d3e19ec79c0eeb89f88de2080553786ba806dd1fdb7af884b16e7aaf3aab9460310051255b8e36137a02362f5b6177c7930f1f014a232d4dc8fba2ecd643deca98c33699b847af630104645cdd4d4113ede3a40e5da723cf46b3e6088fdd86beb83e40773f6835a9990a00e64aabb1783b00b8543fc97fbd740b4ec44059e48e0fe5f671ffaec4dfc1d483cffd00f8a46f86d1095b0dc4fa24792254f2dccb62a33d31c91fa99b02b8c0b87d7ecb2a05e1bce716b510be6ef213079bf698f9a62049e46d0808f13d50c98b460e47b4bf18194cca0c411582d62088cac38ea3d562d3606bd0e28326c563d3e9c457c95b38a1347909d90404f030c7b2aa334c223ffdfa81d6e48f632c4e3d5a520fe2ebbab149d25799d5844a8106768cad90630196825c2991f6a9f15167b32fe9b4f4f6423c5d4f25d91e43f8e5ca29f10923b4d2e91c085311a372970ead47263a756143e8c56b6e0a609dc83576721e5a6c3a382613a76607fcf644c1c21955f5f8340aa317bdf3cdddd3f14c333c9ecaa9a33894ee49a43080daa37b9d3d87be09f542d3caf305aa33a5b6d2906ed3ee9d8ded1eba278e553c71059a9723653688f59c5c50df3e72c93489305b95dde053093ac0ff142517ee88415f56cb34b679d1f51bba35558c9afe0f72b64f93612137dc89875cd19e1c480ea42c0bf3e9949b9858f9611f09064d3c4e9f1d0b77360fb09ddc92ba05fb5f7a9d505a2ed5d5139062c2be79fa18cfcf2631f8dc6dc6da784357dbc91d1151ad9999a5e28e5f2a25dd52c533edd8056a43f99a3a9d04941a38d13e0dba3854b3e89d02b48e6cec491936ed6a9b87987a1bc279b2080e56000b84d356f703ed7fd03bc9ea8a03721858028ea0ebb86a70f4fb6dadb626f98530ffa5f40647e00a21a895b4665eb8c23adf1176f2f97b7d9052e11c5157cd2cdb8b11a368ac380912b0ddb0e7db8032fc7c624b5d9bef570e2975aa24eec636139bb914e80bd4346f7a0646561c53c18f00c994e38cf9d706a0b0afc3c55ec7661a69fa344d6e81df6fb74737d0a709e5e49520ccc3966a639708d6568dd1cd6277a3fc21c1c605b9cc6a481159f2f6c752ec5128f80e671593e854d4f51ff8fd6bcbb0b64ae15b153578ac9b85e026434f99f04cf432da785c2849b8f1338a91ae34495ab33cd85407506495d5a6c89441ab4212aa691c6592d14fd6ce6ae7caef1b7ccdc8d5d5d56ed15c9ec2bf9fd2621da9db4184f4f55ce95a4e8b9af57581948449dd0ad22324e522a2ac6936e27f247e124a40c5d44a9a9ed81b30a2df4332221965918a2ad7791c91b39ab5f147fa1c0306746e8085ce381c2213a745a4e26a4753dfb119277e6aa358f86a4dd18f86f2bcfd2068ac19d0eff954e8afd8a5fa15bd2f757443276eb8b90731915a20132dda0441124d43a5e5c5bec6c30d72ea5d3dc8300287fd3e5e4b2a2d1d41b615c6554af6604eaa4b9b1a94b3f6dc78043fb1396ebde0c89ecda6ea3ab232c0574ab559531265c8daced26169ae9f21370d9402d706835012dd53898b84f2cd3e4fa7ef8a777113c89aa48643a527fcb03d7124066cc0c0a624ea5ecca9896915949d97fc06cd4a3e22783b03f7ad2b3aba2def1d8e9b3f77ba78b077483ab5825d4f484dcbbe5e822736c7a107218cdeb767fd2862d7ff280bc46449d9ccadcea9b2dfac4ca48a812ae8b3a539c59ef120f18645a94a6f583b8e3a6ca9d444ce23b2c4d4ad87d534919cdd2869f2c596ced2c61ec8fd60802ea8bc8fc7c14e98f4913bc0c7565f78c685e5e3bda3fd88bf66e416f1effe2b8066f8ba422558d0864d95d75a7832212d25813ec9d7569f219a89ba7166950067eedc23b3c0715b9039883f0e6e908b642b6e50541b2cf4a5b93738c3c9ad00aa75dc474e43c0eefaa4ff666f0f59a6a0ae20ec0327efeeff15aca957e2b924218d9b4d96917825a84cd93a995514959b44e25c377539205f75f8ad317f7ae5c4029e7f53909e772eed07677ab6e4f769ed0341257c840f3599279c551c22f357cdff5ce3b3639e89208463ba3426d5f675ac2f39f4487b977f88b51a1d0028446a888507576e7933a4e57ca293a4bee4d684afed3e598dab2d84d7f892a977e1fad2c0a78e71d8e10e979b69629c389b5e4a9bd2fae468fd851b66974072f12c603ad72bb7c0018f34d4649cc0271a4d940d3e5e25909f2466feafffd8e3d57a2590ce0f595d485b1ebaf1668b3684fabcd68cfb59ba8619bfaefc8335dd48446c5d00000800000000000086066e93c6693c9f55c12d1d2bc3d502ee6c4eb8f2cadc3e2dba3db5434a0b0df8012d553fb540912a0f95b8a36267849bdbe952a6b3331e69247882c52d3811e09e18e5c5e59394d9436f157f961868028d2da2208c2e6308ea86244a2c9deab5d099d7cb133348be3be895be84691e32a7d0875accfeef6409f4f92f5e363d07ff70e03d459952525445688aed64f6a924b2fb05f7640b3a393ae078032ea7bc06b13f293c060a3233e89f5faa472157c1ff30b37b1ca3ba3972141d49e61e1027739238c7437a8789ea2c2d7437f6d9f126c0617e239fc6335707b0217f63e40e96266c5305f85a91d2bbed5d5df57e4aeb22d16c1d680a152b7e1aa2780b56e7d4752f821dec371eb6ef58283180df79f7586a9190f0812092b944a82ee7a03eeaf7d68527c3e733f7da479b29ac647783d2ac65b9098200f0d97d1468024e52b757fd5f066e2abbd5877987fbb8de1cc385ad3f9af6596dcd672aa50fb5f77d9d5643ce48f85455224a715bd8d8f3247ba2019e07715ad913b48cc71941a29677445a60c67f3f87d5f7f5d98ae61bbe", @ANYRES64=r2, @ANYRES32=r2, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES32=r3], @ANYRES32=r2], 0x102c) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc00100000000a000400030082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r11, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r11, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x40086602, 0x400007) openat$cgroup_ro(r12, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r11, 0x800454e1, &(0x7f0000000440)=r12) 05:53:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 2544.123417][T22854] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 05:53:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:53:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:53:03 executing program 2 (fault-call:1 fault-nth:0): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2544.662779][T22885] FAULT_INJECTION: forcing a failure. [ 2544.662779][T22885] name failslab, interval 1, probability 0, space 0, times 0 [ 2544.729971][T22885] CPU: 1 PID: 22885 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 2544.737907][T22885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2544.747976][T22885] Call Trace: [ 2544.751276][T22885] dump_stack+0x172/0x1f0 [ 2544.755629][T22885] should_fail.cold+0xa/0x15 [ 2544.760234][T22885] ? fault_create_debugfs_attr+0x180/0x180 [ 2544.766055][T22885] ? ___might_sleep+0x163/0x2c0 [ 2544.770922][T22885] __should_failslab+0x121/0x190 [ 2544.775867][T22885] should_failslab+0x9/0x14 [ 2544.780369][T22885] kmem_cache_alloc+0x2aa/0x710 [ 2544.785217][T22885] ? __kasan_check_write+0x14/0x20 [ 2544.790315][T22885] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2544.795844][T22885] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2544.801117][T22885] getname_flags+0xd6/0x5b0 [ 2544.805608][T22885] getname+0x1a/0x20 [ 2544.809487][T22885] do_sys_open+0x2c9/0x5d0 [ 2544.813896][T22885] ? filp_open+0x80/0x80 [ 2544.818123][T22885] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2544.823575][T22885] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2544.829019][T22885] ? do_syscall_64+0x26/0x760 [ 2544.833676][T22885] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2544.839722][T22885] ? do_syscall_64+0x26/0x760 [ 2544.844384][T22885] __x64_sys_openat+0x9d/0x100 [ 2544.849134][T22885] do_syscall_64+0xfa/0x760 [ 2544.853625][T22885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2544.859498][T22885] RIP: 0033:0x459a59 [ 2544.863376][T22885] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2544.882957][T22885] RSP: 002b:00007fe1d5296c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2544.891347][T22885] RAX: ffffffffffffffda RBX: 00007fe1d5296c90 RCX: 0000000000459a59 [ 2544.899300][T22885] RDX: 0000000000200002 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 2544.907250][T22885] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2544.915221][T22885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1d52976d4 [ 2544.923197][T22885] R13: 00000000004c6510 R14: 00000000004db8d0 R15: 0000000000000003 [ 2545.024426][T22844] device nr0 entered promiscuous mode [ 2545.361200][T22817] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2545.365368][T22889] IPVS: ftp: loaded support on port[0] = 21 [ 2545.722238][T22808] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2546.053283][T22822] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x288, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x3}, 0xc01}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000140)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000200)=0xa7) r4 = gettid() perf_event_open(&(0x7f0000000540)={0x5, 0x70, 0x8, 0x2, 0x81, 0x11, 0x0, 0x40, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xe52c, 0x0, @perf_config_ext={0x0, 0x401}, 0x100, 0x4a86, 0x7, 0x7, 0x2, 0x753, 0x9}, r4, 0x1, 0xffffffffffffffff, 0xc) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000080)=0xffff, 0xffffff43) r6 = gettid() r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r7, 0x0, 0x1e, &(0x7f0000000240)='{nodev+em0ppp0trustedbdeveth0\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xfffffffffffffd64, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x6, 0x2003}, 0x0, 0x0, &(0x7f0000000640)={0x1, 0x0, 0x1, 0x8}, &(0x7f0000000480)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={r8, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000580)='memory.events\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000240)='pids.events\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r4, r5, 0x0, 0x1b, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', r10}, 0x30) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x3e, 0x1, 0x0, 0x1, 0x0, 0x9, 0x2e040, 0xc48b15b72113e105, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={&(0x7f0000000180), 0xfe77c41e1e4b0510}, 0x20a15, 0x8ce, 0x1, 0x9, 0x80000000, 0x3, 0x4}, r4, 0x4, 0xffffffffffffffff, 0x8) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) write$cgroup_subtree(r1, &(0x7f0000002d40)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="d55794f0f58b3e8edd8542ddad9360809d55eecadac48d0b26c8fbbb78a28cf407e0ae6a3798f6f4cfe3565c1b9b877f024e6db94c09922f3494f5ed78f45ccf945ba0ee51643ef4f49f7989d791bd37b9a6029ee313870ae7120c8f2d8188e125a87f06ca38983687738c770fdb6477ce3a12d9ebb5cde90983b68b5f205d4a3925dbb13839f364475ba4125223179c6e0a04047208008254ccb15e96bb4db70be4def6a2efdd77f4a3ae17bae5fd82a3b8c7ce208329e4423e6d9fc492b4959161a12959a974df7e61a061dc115c93e68b867d1f175b98eb620f269f451579ee10aaa5e92b3b4d1fe6205ec06a9cc3d35ce36e82a563bb6a2ca1c64efc510c996571c880ca1eda3a9d4c45aa231573be27c3f9ca61c66b21b316e06b202a906b598777884d7f5f8287e1a8b2800c81bbab484651a579fad347ef24fb335b2f260669783d4e64fd7b50998c90873cb105cb78b3c29191227ae607e2945f03ce24c8d675b2126f72826848097f29ca4acc46f4f27df002fd4d565a89b5621c1c739f600f30f0497298aad1b08e82a76e533456637b0c2e57f8ba3c97da224026851eafb07d4fef7f7f505d93e3e8715dd001305fd88d379dbdf463cc432da5f982df813ab4c08ec226d4f8b490afd8237dfedde1703faf685762b7935a9ae6e0de00d86f9d33cb50ee8f04881c77808d2ed7606a4927a20e290e177139eb917ba5c8c62cbbdcf205a3c5c94424b2b7fd4cfffa4aebb97367e56113cc145e08fc8c846fa46ea9e6aed03c8bd4ca657c8380672621fed957616196aba05d3720d85fd126cc357f83699c94039dc191e8aed3a8a38495ef482986ed6ed58cb246120899bb6d3f00206fa7bcc4b575f5e0a1231393b03a401d953a7d23c1ac0b1ed22b7ab12c8a74e5d2e1a3b375253ce21e6ae058ac19c21f7d068d9749a4eb523bcaf423a8c8b90022f671441329975afacd88bc93c3055ad6918cdf8b156bca96065008fb9871c3be104a6b73a8a8a4733394b86cef81aa9845dc6058d5eefa124858af151a63a3f6c4fb7409b7723755ebe2044b67fdb5201da0ee9a446a2f8b710cce0359269f96b1d826d256376d34346d97e6afe5c1344311658ed7d947495eee2853f45f99f2c886c2f0dd70f1ee8813018fbcc941d110e0622a1adfde6a942a0c0f4d3a26774881f56b0afafbf4354240a971993aee963d5a5299139e82134571234eb4ca83c7d23218f8a1260539cc9385ce056c4123bd9c2fd6a0854cfbab8a1bfeb99f9f1d1b26d641b88dda7d73c103d1046eb819d1c8afa9806c0925d35896fb7dc09bcea01927d1e19c570642a8e53a59db7a08fd53d8732c657fc2a3fd6fa53377dd3eda965fb4e0b596ddfa4285eb9b6f11156bd320d6c4c4181293a4e95c38f44342178defdb7c5c4e479fbb2a2148ba9bb100934e2cf899bd749a93829a567c35707a33d183b5c7ff8da26ca79090c45c8a15a46900fb30f014b5a74b792bc13d49b34ea73ea7e8093cc5f53eaffdc4473bcf9893a3c8f15580191d8ac451d0ee60839fc2871a2f6115687ea29a6d0c42f4945536ef484f8560f22e569b75a1bdfb6efb86639eddb35f817f045110ea810e905cddc21bafe4db9f4777009db389a870012eb5b43c7eae926694522405b321cd89f4561b0036c8bc840e6191ecaba440f782556e0a4c1d6e8941922f3fb1c958ee8644a747883c75a6da18f3a5f1c1b0e8e65ac98337cdb3c9cd53cd8992555437b0c2c9b25a629b426ad3b2e1118e27ccf9d06d50b4c9e1f85db8e32ef96a40beac7cb6fbd0da6031da2db827426a4883e4226bb00df514bce686f26645312d5687f52d0ec15005483d4d4bcd50969d0418544fd5a7f6884c11a46f6485cc2196cd51d7edc469959ae339c2461df751eafb36998cedca89d090c2193cb2f3abea9c78a837cf4fb0ace8d125df1910f7ee7bd586fa28ab324966c4d0aa0e54e21ee04798e2ef1816d019cf9a6fd9aa6284bb76b5e435a7cb7cb769ef25c68b372dcb6f87c41ce1d9ac4673bdb830bf301ac31ace63822c33c67e0956c72feb4eb190bc430448a66f079cdf14438522eca7a350c76f1abb556e47001d2c7285467eee529cec40d3fc896a53a0c8341d7153f14f62e6ce8139dcfbf7ad3055d392f8d1688886217c798a79c9c2090251013c3b6c17849cea0232137785be69eb4f82ddbf9c74ae61cd88e94b05b40a43a0d38affd26ce857afba29f3e429c8921b899f876564407a175e11d6bd81f82ab57ecfc2941a0451597017408709e5d8227232b6d24b8d8018b6c8297f8ed74676464119ad18b103213361b0d1b38185b8887e40321110cc15324597b5e45fb69f895d872fa11eb40e2c085610e1aba842f52784680b654fc556400939dd864a2afab5e59fe8da855f7b46b480ffadc514670a0c6a53c4745b8a62f4aa13c39ee6d4142e9af764c9257459adca9651157ec96abf00ac4ab902cc6ee5b4a7d5e3877534a28f1a9bd33a91db8e5853e901a666a90c5099ae8a05473e8de459d495ca144d3f72d5a49006ba1ca80973d25a408780e3b4a0c11190dc4a071d77801ad335dda742d441612a9adcb6d4980a5e7b509653b12dcf839a198edbd4f6b8ef5f155a0cd8192e21737417f404b6ec39e861fb85bd65f46483339ecf67ca732d5c06949e67df40a23dff3dbb8fc5bf059cfe3b6f276e68b74c5e80ad7e21491f8ad0dcce15d908991926d7b4fb3ab1814d6cdb3475f40bb44ff166ca9c2dd9fc933e2bc11155d5ef2055185a46ecd13135c7725d1c6f388a31484d6c949910a5b3903d910792fff6bec14f339eb967a5bcc71cac11890f52227ec0f31ca340b3993a401fa335531636ba355d0b7a320c1052e4bb66abfb747f8104994789121a1c69807770d2c5e25184519455134423465bd19143ba7b1498a39a31eb8e96bf01e3d84752cf5b167fd8dd67338ffdc799c188799483a73deb95ee7c7f09b57cb16ca0f83980ae086096113b0c29c94ae8307de293f996a7acec3ed9fd0708ee7524ce130a5a50f69797aa248ed1b5c2b03ac6311216400d2a274b436f990960d826fd0ddb10c61772755165d646b365a82957413356541ff82afc9436f46567001c2f704e79ea64256732edd48206fb6fc6f4fd0c9ed5eea5e97e98e81d32487876e12075ce7259bd93f81e1f151fc82e32d070a3175f142803580418fe70072f1a4f4c4e2f3e1d7f2bd5d1d5c84c83a8c1bea82b0984196d77c36f3b92c55d07c53883a340305bf0c5358598f54e27822676ebcb3447206cb378fba819b12bf75b8a6c88a784a189f15065c83da315886ba2d8f39d895ee3eebe910e0872843ccd6317932f56e1cec72446cf680a5ce25b79f191ce0ab4509f24f595e1be945f366fefb8388a9c62c895474dd0614875f50883b3cb6be1d3e19ec79c0eeb89f88de2080553786ba806dd1fdb7af884b16e7aaf3aab9460310051255b8e36137a02362f5b6177c7930f1f014a232d4dc8fba2ecd643deca98c33699b847af630104645cdd4d4113ede3a40e5da723cf46b3e6088fdd86beb83e40773f6835a9990a00e64aabb1783b00b8543fc97fbd740b4ec44059e48e0fe5f671ffaec4dfc1d483cffd00f8a46f86d1095b0dc4fa24792254f2dccb62a33d31c91fa99b02b8c0b87d7ecb2a05e1bce716b510be6ef213079bf698f9a62049e46d0808f13d50c98b460e47b4bf18194cca0c411582d62088cac38ea3d562d3606bd0e28326c563d3e9c457c95b38a1347909d90404f030c7b2aa334c223ffdfa81d6e48f632c4e3d5a520fe2ebbab149d25799d5844a8106768cad90630196825c2991f6a9f15167b32fe9b4f4f6423c5d4f25d91e43f8e5ca29f10923b4d2e91c085311a372970ead47263a756143e8c56b6e0a609dc83576721e5a6c3a382613a76607fcf644c1c21955f5f8340aa317bdf3cdddd3f14c333c9ecaa9a33894ee49a43080daa37b9d3d87be09f542d3caf305aa33a5b6d2906ed3ee9d8ded1eba278e553c71059a9723653688f59c5c50df3e72c93489305b95dde053093ac0ff142517ee88415f56cb34b679d1f51bba35558c9afe0f72b64f93612137dc89875cd19e1c480ea42c0bf3e9949b9858f9611f09064d3c4e9f1d0b77360fb09ddc92ba05fb5f7a9d505a2ed5d5139062c2be79fa18cfcf2631f8dc6dc6da784357dbc91d1151ad9999a5e28e5f2a25dd52c533edd8056a43f99a3a9d04941a38d13e0dba3854b3e89d02b48e6cec491936ed6a9b87987a1bc279b2080e56000b84d356f703ed7fd03bc9ea8a03721858028ea0ebb86a70f4fb6dadb626f98530ffa5f40647e00a21a895b4665eb8c23adf1176f2f97b7d9052e11c5157cd2cdb8b11a368ac380912b0ddb0e7db8032fc7c624b5d9bef570e2975aa24eec636139bb914e80bd4346f7a0646561c53c18f00c994e38cf9d706a0b0afc3c55ec7661a69fa344d6e81df6fb74737d0a709e5e49520ccc3966a639708d6568dd1cd6277a3fc21c1c605b9cc6a481159f2f6c752ec5128f80e671593e854d4f51ff8fd6bcbb0b64ae15b153578ac9b85e026434f99f04cf432da785c2849b8f1338a91ae34495ab33cd85407506495d5a6c89441ab4212aa691c6592d14fd6ce6ae7caef1b7ccdc8d5d5d56ed15c9ec2bf9fd2621da9db4184f4f55ce95a4e8b9af57581948449dd0ad22324e522a2ac6936e27f247e124a40c5d44a9a9ed81b30a2df4332221965918a2ad7791c91b39ab5f147fa1c0306746e8085ce381c2213a745a4e26a4753dfb119277e6aa358f86a4dd18f86f2bcfd2068ac19d0eff954e8afd8a5fa15bd2f757443276eb8b90731915a20132dda0441124d43a5e5c5bec6c30d72ea5d3dc8300287fd3e5e4b2a2d1d41b615c6554af6604eaa4b9b1a94b3f6dc78043fb1396ebde0c89ecda6ea3ab232c0574ab559531265c8daced26169ae9f21370d9402d706835012dd53898b84f2cd3e4fa7ef8a777113c89aa48643a527fcb03d7124066cc0c0a624ea5ecca9896915949d97fc06cd4a3e22783b03f7ad2b3aba2def1d8e9b3f77ba78b077483ab5825d4f484dcbbe5e822736c7a107218cdeb767fd2862d7ff280bc46449d9ccadcea9b2dfac4ca48a812ae8b3a539c59ef120f18645a94a6f583b8e3a6ca9d444ce23b2c4d4ad87d534919cdd2869f2c596ced2c61ec8fd60802ea8bc8fc7c14e98f4913bc0c7565f78c685e5e3bda3fd88bf66e416f1effe2b8066f8ba422558d0864d95d75a7832212d25813ec9d7569f219a89ba7166950067eedc23b3c0715b9039883f0e6e908b642b6e50541b2cf4a5b93738c3c9ad00aa75dc474e43c0eefaa4ff666f0f59a6a0ae20ec0327efeeff15aca957e2b924218d9b4d96917825a84cd93a995514959b44e25c377539205f75f8ad317f7ae5c4029e7f53909e772eed07677ab6e4f769ed0341257c840f3599279c551c22f357cdff5ce3b3639e89208463ba3426d5f675ac2f39f4487b977f88b51a1d0028446a888507576e7933a4e57ca293a4bee4d684afed3e598dab2d84d7f892a977e1fad2c0a78e71d8e10e979b69629c389b5e4a9bd2fae468fd851b66974072f12c603ad72bb7c0018f34d4649cc0271a4d940d3e5e25909f2466feafffd8e3d57a2590ce0f595d485b1ebaf1668b3684fabcd68cfb59ba8619bfaefc8335dd48446c5d00000800000000000086066e93c6693c9f55c12d1d2bc3d502ee6c4eb8f2cadc3e2dba3db5434a0b0df8012d553fb540912a0f95b8a36267849bdbe952a6b3331e69247882c52d3811e09e18e5c5e59394d9436f157f961868028d2da2208c2e6308ea86244a2c9deab5d099d7cb133348be3be895be84691e32a7d0875accfeef6409f4f92f5e363d07ff70e03d459952525445688aed64f6a924b2fb05f7640b3a393ae078032ea7bc06b13f293c060a3233e89f5faa472157c1ff30b37b1ca3ba3972141d49e61e1027739238c7437a8789ea2c2d7437f6d9f126c0617e239fc6335707b0217f63e40e96266c5305f85a91d2bbed5d5df57e4aeb22d16c1d680a152b7e1aa2780b56e7d4752f821dec371eb6ef58283180df79f7586a9190f0812092b944a82ee7a03eeaf7d68527c3e733f7da479b29ac647783d2ac65b9098200f0d97d1468024e52b757fd5f066e2abbd5877987fbb8de1cc385ad3f9af6596dcd672aa50fb5f77d9d5643ce48f85455224a715bd8d8f3247ba2019e07715ad913b48cc71941a29677445a60c67f3f87d5f7f5d98ae61bbe", @ANYRES64=r2, @ANYRES32=r2, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES32=r3], @ANYRES32=r2], 0x102c) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc00100000000a000400030082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r11, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r11, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x40086602, 0x400007) openat$cgroup_ro(r12, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r11, 0x800454e1, &(0x7f0000000440)=r12) [ 2546.342919][T22893] device nr0 entered promiscuous mode [ 2546.415718][T22893] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2546.456751][T22896] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2547.528710][T22889] chnl_net:caif_netlink_parms(): no params data found [ 2547.694882][T22889] bridge0: port 1(bridge_slave_0) entered blocking state [ 2547.702482][T22889] bridge0: port 1(bridge_slave_0) entered disabled state [ 2547.717696][T22889] device bridge_slave_0 entered promiscuous mode [ 2547.795589][T22889] bridge0: port 2(bridge_slave_1) entered blocking state [ 2547.804890][T22889] bridge0: port 2(bridge_slave_1) entered disabled state [ 2547.821194][T22889] device bridge_slave_1 entered promiscuous mode [ 2547.892595][T22889] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2547.911206][T22889] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2547.998744][T22889] team0: Port device team_slave_0 added [ 2548.011597][T22889] team0: Port device team_slave_1 added [ 2548.094533][T22889] device hsr_slave_0 entered promiscuous mode [ 2548.141190][T22889] device hsr_slave_1 entered promiscuous mode [ 2548.210189][T22889] debugfs: Directory 'hsr0' with parent '/' already present! [ 2548.282793][T22889] bridge0: port 2(bridge_slave_1) entered blocking state [ 2548.289935][T22889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2548.297300][T22889] bridge0: port 1(bridge_slave_0) entered blocking state [ 2548.304403][T22889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2548.386067][T24866] bridge0: port 1(bridge_slave_0) entered disabled state [ 2548.395043][T24866] bridge0: port 2(bridge_slave_1) entered disabled state [ 2548.618600][T22889] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2548.640565][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2548.650537][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2548.665238][T22889] 8021q: adding VLAN 0 to HW filter on device team0 [ 2548.759733][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2548.772269][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2548.782253][T10760] bridge0: port 1(bridge_slave_0) entered blocking state [ 2548.789332][T10760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2548.814014][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2548.825084][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2548.834697][T10761] bridge0: port 2(bridge_slave_1) entered blocking state [ 2548.841830][T10761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2548.852280][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2548.915825][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2548.935198][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2548.946807][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2548.970859][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2548.981620][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2548.995679][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2549.006113][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2549.016318][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2549.036621][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2549.047153][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2549.123648][T22889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2549.172339][T22889] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2549.413754][T22929] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2549.428074][T22929] CPU: 0 PID: 22929 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2549.436004][T22929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2549.446069][T22929] Call Trace: [ 2549.449374][T22929] dump_stack+0x172/0x1f0 [ 2549.453716][T22929] dump_header+0x10b/0x82d [ 2549.458140][T22929] oom_kill_process.cold+0x10/0x15 [ 2549.463260][T22929] out_of_memory+0x334/0x1340 [ 2549.467941][T22929] ? __sched_text_start+0x8/0x8 [ 2549.472793][T22929] ? oom_killer_disable+0x280/0x280 [ 2549.478003][T22929] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2549.483557][T22929] ? memcg_stat_show+0xc40/0xc40 [ 2549.488508][T22929] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2549.494304][T22929] ? cgroup_file_notify+0x140/0x1b0 [ 2549.499523][T22929] memory_max_write+0x262/0x3a0 [ 2549.504367][T22929] ? mem_cgroup_write+0x370/0x370 [ 2549.509376][T22929] ? lock_acquire+0x190/0x410 [ 2549.514036][T22929] ? kernfs_fop_write+0x227/0x480 [ 2549.519046][T22929] cgroup_file_write+0x241/0x790 [ 2549.523971][T22929] ? mem_cgroup_write+0x370/0x370 [ 2549.529011][T22929] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2549.534633][T22929] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2549.540261][T22929] kernfs_fop_write+0x2b8/0x480 [ 2549.545095][T22929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2549.551341][T22929] __vfs_write+0x8a/0x110 [ 2549.555655][T22929] ? kernfs_fop_open+0xd80/0xd80 [ 2549.560576][T22929] vfs_write+0x268/0x5d0 [ 2549.564805][T22929] ksys_write+0x14f/0x290 [ 2549.569119][T22929] ? __ia32_sys_read+0xb0/0xb0 [ 2549.573866][T22929] ? do_syscall_64+0x26/0x760 [ 2549.578529][T22929] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2549.584580][T22929] ? do_syscall_64+0x26/0x760 [ 2549.589247][T22929] __x64_sys_write+0x73/0xb0 [ 2549.593822][T22929] do_syscall_64+0xfa/0x760 [ 2549.598311][T22929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2549.604185][T22929] RIP: 0033:0x459a59 [ 2549.608062][T22929] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2549.627649][T22929] RSP: 002b:00007f04f3f0cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2549.636042][T22929] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2549.644011][T22929] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 2549.651965][T22929] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2549.659934][T22929] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f04f3f0d6d4 [ 2549.667887][T22929] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2549.682344][T22929] memory: usage 6720kB, limit 0kB, failcnt 502 [ 2549.688692][T22929] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2549.696166][T22929] Memory cgroup stats for /syz4: [ 2549.696288][T22929] anon 4325376 [ 2549.696288][T22929] file 49152 [ 2549.696288][T22929] kernel_stack 0 [ 2549.696288][T22929] slab 2285568 [ 2549.696288][T22929] sock 0 [ 2549.696288][T22929] shmem 221184 [ 2549.696288][T22929] file_mapped 0 [ 2549.696288][T22929] file_dirty 135168 [ 2549.696288][T22929] file_writeback 0 [ 2549.696288][T22929] anon_thp 4194304 [ 2549.696288][T22929] inactive_anon 135168 [ 2549.696288][T22929] active_anon 4325376 [ 2549.696288][T22929] inactive_file 16384 [ 2549.696288][T22929] active_file 12288 [ 2549.696288][T22929] unevictable 0 [ 2549.696288][T22929] slab_reclaimable 1486848 [ 2549.696288][T22929] slab_unreclaimable 798720 [ 2549.696288][T22929] pgfault 258324 [ 2549.696288][T22929] pgmajfault 0 [ 2549.696288][T22929] workingset_refault 0 [ 2549.696288][T22929] workingset_activate 0 [ 2549.696288][T22929] workingset_nodereclaim 0 [ 2549.696288][T22929] pgrefill 1610 [ 2549.696288][T22929] pgscan 7079 [ 2549.696288][T22929] pgsteal 3188 [ 2549.793489][T22929] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22928,uid=0 05:53:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480a0000}, 0x0) [ 2549.820337][T22929] Memory cgroup out of memory: Killed process 22928 (syz-executor.4) total-vm:72580kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 2549.847181][ T1071] oom_reaper: reaped process 22928 (syz-executor.4), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB 05:53:09 executing program 2 (fault-call:1 fault-nth:1): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x5000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x289, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x287, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2549.913082][T22889] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2549.925458][T22936] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2549.937143][T22889] CPU: 1 PID: 22889 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2549.945064][T22889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2549.945070][T22889] Call Trace: [ 2549.945089][T22889] dump_stack+0x172/0x1f0 [ 2549.945109][T22889] dump_header+0x10b/0x82d [ 2549.945120][T22889] ? oom_kill_process+0x94/0x3f0 [ 2549.945136][T22889] oom_kill_process.cold+0x10/0x15 [ 2549.945151][T22889] out_of_memory+0x334/0x1340 [ 2549.945172][T22889] ? lock_downgrade+0x920/0x920 [ 2549.958365][T22938] FAULT_INJECTION: forcing a failure. [ 2549.958365][T22938] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2549.958501][T22889] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2550.005648][T22889] ? oom_killer_disable+0x280/0x280 [ 2550.010858][T22889] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2550.016396][T22889] ? memcg_stat_show+0xc40/0xc40 [ 2550.021347][T22889] ? do_raw_spin_unlock+0x57/0x270 [ 2550.026453][T22889] ? _raw_spin_unlock+0x2d/0x50 [ 2550.031294][T22889] try_charge+0xf4b/0x1440 [ 2550.035734][T22889] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2550.041269][T22889] ? percpu_ref_tryget_live+0x111/0x290 [ 2550.046809][T22889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2550.053047][T22889] ? __kasan_check_read+0x11/0x20 [ 2550.058067][T22889] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2550.063611][T22889] mem_cgroup_try_charge+0x136/0x590 [ 2550.068895][T22889] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2550.074523][T22889] wp_page_copy+0x407/0x1860 [ 2550.079105][T22889] ? find_held_lock+0x35/0x130 [ 2550.083863][T22889] ? do_wp_page+0x53b/0x15c0 [ 2550.088455][T22889] ? pmd_devmap_trans_unstable+0x220/0x220 [ 2550.094267][T22889] ? lock_downgrade+0x920/0x920 [ 2550.099123][T22889] ? swp_swapcount+0x540/0x540 [ 2550.103880][T22889] ? __kasan_check_read+0x11/0x20 [ 2550.108893][T22889] ? do_raw_spin_unlock+0x57/0x270 [ 2550.113999][T22889] do_wp_page+0x543/0x15c0 [ 2550.118412][T22889] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 2550.123792][T22889] __handle_mm_fault+0x23ec/0x4040 [ 2550.128905][T22889] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2550.134441][T22889] ? handle_mm_fault+0x292/0xaa0 [ 2550.139397][T22889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2550.145630][T22889] ? __kasan_check_read+0x11/0x20 [ 2550.150652][T22889] handle_mm_fault+0x3b7/0xaa0 [ 2550.155411][T22889] __do_page_fault+0x536/0xdd0 [ 2550.160172][T22889] do_page_fault+0x38/0x590 [ 2550.164669][T22889] page_fault+0x39/0x40 [ 2550.168815][T22889] RIP: 0033:0x430b36 [ 2550.172702][T22889] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 2550.192295][T22889] RSP: 002b:00007ffc0b87e450 EFLAGS: 00010206 [ 2550.198349][T22889] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 2550.206311][T22889] RDX: 0000000001c4c930 RSI: 0000000001c54970 RDI: 0000000000000003 [ 2550.214270][T22889] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001c4b940 [ 2550.222230][T22889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 2550.230189][T22889] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 2550.238192][T22938] CPU: 0 PID: 22938 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 2550.246098][T22938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2550.256159][T22938] Call Trace: [ 2550.259455][T22938] dump_stack+0x172/0x1f0 [ 2550.263796][T22938] should_fail.cold+0xa/0x15 [ 2550.268395][T22938] ? fault_create_debugfs_attr+0x180/0x180 [ 2550.274211][T22938] ? __kasan_check_read+0x11/0x20 [ 2550.279234][T22938] ? __lock_acquire+0x16f2/0x4a00 [ 2550.284271][T22938] should_fail_alloc_page+0x50/0x60 [ 2550.289476][T22938] __alloc_pages_nodemask+0x1a1/0x900 [ 2550.294855][T22938] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2550.300498][T22938] ? __alloc_pages_slowpath+0x2910/0x2910 [ 2550.304091][T22889] memory: usage 2332kB, limit 0kB, failcnt 514 [ 2550.306214][T22938] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2550.306242][T22938] ? fault_create_debugfs_attr+0x180/0x180 [ 2550.306260][T22938] cache_grow_begin+0x90/0xd20 [ 2550.312519][T22889] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2550.318012][T22938] ? getname_flags+0xd6/0x5b0 [ 2550.318031][T22938] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2550.318047][T22938] kmem_cache_alloc+0x64e/0x710 [ 2550.318064][T22938] ? __kasan_check_write+0x14/0x20 [ 2550.324709][T22889] Memory cgroup stats for /syz4: [ 2550.324823][T22889] anon 57344 [ 2550.324823][T22889] file 49152 [ 2550.324823][T22889] kernel_stack 0 [ 2550.324823][T22889] slab 2285568 [ 2550.324823][T22889] sock 0 [ 2550.324823][T22889] shmem 221184 [ 2550.324823][T22889] file_mapped 0 [ 2550.324823][T22889] file_dirty 135168 [ 2550.324823][T22889] file_writeback 0 [ 2550.324823][T22889] anon_thp 0 [ 2550.324823][T22889] inactive_anon 135168 [ 2550.324823][T22889] active_anon 57344 [ 2550.324823][T22889] inactive_file 16384 [ 2550.324823][T22889] active_file 12288 [ 2550.324823][T22889] unevictable 0 [ 2550.324823][T22889] slab_reclaimable 1486848 [ 2550.324823][T22889] slab_unreclaimable 798720 [ 2550.324823][T22889] pgfault 258324 [ 2550.324823][T22889] pgmajfault 0 [ 2550.324823][T22889] workingset_refault 0 [ 2550.324823][T22889] workingset_activate 0 [ 2550.324823][T22889] workingset_nodereclaim 0 [ 2550.324823][T22889] pgrefill 1610 [ 2550.324823][T22889] pgscan 7079 [ 2550.324823][T22889] pgsteal 3188 [ 2550.324823][T22889] pgactivate 2805 [ 2550.328611][T22938] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2550.328634][T22938] getname_flags+0xd6/0x5b0 [ 2550.328653][T22938] getname+0x1a/0x20 [ 2550.328671][T22938] do_sys_open+0x2c9/0x5d0 [ 2550.341530][T22889] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22889,uid=0 [ 2550.346397][T22938] ? filp_open+0x80/0x80 [ 2550.346418][T22938] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2550.346436][T22938] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2550.352361][T22889] Memory cgroup out of memory: Killed process 22889 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 2550.356418][T22938] ? do_syscall_64+0x26/0x760 [ 2550.356434][T22938] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2550.356447][T22938] ? do_syscall_64+0x26/0x760 [ 2550.356468][T22938] __x64_sys_openat+0x9d/0x100 [ 2550.356486][T22938] do_syscall_64+0xfa/0x760 [ 2550.452487][T22938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2550.452500][T22938] RIP: 0033:0x459a59 [ 2550.452514][T22938] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2550.452520][T22938] RSP: 002b:00007fe1d5296c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2550.452532][T22938] RAX: ffffffffffffffda RBX: 00007fe1d5296c90 RCX: 0000000000459a59 [ 2550.452540][T22938] RDX: 0000000000200002 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 2550.452547][T22938] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2550.452555][T22938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1d52976d4 05:53:09 executing program 2 (fault-call:1 fault-nth:2): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2550.452562][T22938] R13: 00000000004c6510 R14: 00000000004db8d0 R15: 0000000000000003 [ 2550.842627][T22974] FAULT_INJECTION: forcing a failure. [ 2550.842627][T22974] name failslab, interval 1, probability 0, space 0, times 0 [ 2550.893051][T22974] CPU: 1 PID: 22974 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 2550.900993][T22974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2550.911058][T22974] Call Trace: [ 2550.914384][T22974] dump_stack+0x172/0x1f0 [ 2550.918742][T22974] should_fail.cold+0xa/0x15 [ 2550.923357][T22974] ? fault_create_debugfs_attr+0x180/0x180 [ 2550.929187][T22974] ? ___might_sleep+0x163/0x2c0 [ 2550.934066][T22974] __should_failslab+0x121/0x190 [ 2550.939023][T22974] should_failslab+0x9/0x14 [ 2550.943658][T22974] kmem_cache_alloc+0x2aa/0x710 [ 2550.948526][T22974] ? stack_trace_save+0xac/0xe0 [ 2550.953395][T22974] __alloc_file+0x27/0x340 [ 2550.957826][T22974] alloc_empty_file+0x72/0x170 [ 2550.962605][T22974] path_openat+0xef/0x46d0 [ 2550.967034][T22974] ? save_stack+0x23/0x90 [ 2550.971373][T22974] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2550.977190][T22974] ? kasan_slab_alloc+0xf/0x20 [ 2550.981971][T22974] ? kmem_cache_alloc+0x121/0x710 [ 2550.987008][T22974] ? getname_flags+0xd6/0x5b0 [ 2550.991696][T22974] ? getname+0x1a/0x20 [ 2550.995777][T22974] ? do_sys_open+0x2c9/0x5d0 [ 2551.000378][T22974] ? __x64_sys_openat+0x9d/0x100 [ 2551.005331][T22974] ? mark_lock+0xc2/0x1220 [ 2551.009759][T22974] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2551.015321][T22974] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2551.020694][T22974] ? __lock_acquire+0x16f2/0x4a00 [ 2551.025726][T22974] ? __alloc_fd+0x487/0x620 [ 2551.030255][T22974] do_filp_open+0x1a1/0x280 [ 2551.034764][T22974] ? may_open_dev+0x100/0x100 [ 2551.039441][T22974] ? lock_downgrade+0x920/0x920 [ 2551.044290][T22974] ? rwlock_bug.part.0+0x90/0x90 [ 2551.049245][T22974] ? __kasan_check_read+0x11/0x20 [ 2551.054281][T22974] ? do_raw_spin_unlock+0x57/0x270 [ 2551.059422][T22974] do_sys_open+0x3fe/0x5d0 [ 2551.063855][T22974] ? filp_open+0x80/0x80 [ 2551.068108][T22974] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2551.073576][T22974] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2551.079041][T22974] ? do_syscall_64+0x26/0x760 [ 2551.083726][T22974] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2551.089802][T22974] ? do_syscall_64+0x26/0x760 [ 2551.094493][T22974] __x64_sys_openat+0x9d/0x100 [ 2551.099263][T22974] do_syscall_64+0xfa/0x760 [ 2551.103777][T22974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2551.109667][T22974] RIP: 0033:0x459a59 [ 2551.113567][T22974] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2551.133176][T22974] RSP: 002b:00007fe1d5296c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2551.141599][T22974] RAX: ffffffffffffffda RBX: 00007fe1d5296c90 RCX: 0000000000459a59 [ 2551.149575][T22974] RDX: 0000000000200002 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 2551.157552][T22974] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2551.165532][T22974] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1d52976d4 [ 2551.173511][T22974] R13: 00000000004c6510 R14: 00000000004db8d0 R15: 0000000000000003 05:53:10 executing program 2 (fault-call:1 fault-nth:3): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='//cgroup\x00', 0x200002, 0x0) 05:53:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c040000}, 0x0) 05:53:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./.group\x00', 0x200002, 0x0) 05:53:11 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='.//group\x00', 0x200002, 0x0) 05:53:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgro.p\x00', 0x200002, 0x0) [ 2552.085472][T22941] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2552.497796][T22934] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2552.798958][T22952] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2553.239301][T22972] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2553.531897][T23027] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x28a, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:12 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgro/p\x00', 0x200002, 0x0) 05:53:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c050000}, 0x0) 05:53:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:12 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='rdma.current\x00', 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0x26160) sendmsg$kcm(r0, &(0x7f0000000900)={0x0, 0xffffffffffffff71, &(0x7f00000001c0)=[{&(0x7f0000000040), 0xfffffffffffffe4f}, {&(0x7f0000000140)="bf05cace18559a7f859133075469295384ee77bb7b079d54d795bcc14ca9eaffe0635b0fe0c2c8ab95ead7ded910545417962626c793eaa10816eb071382767c22a50f1c00da474b954a029893ff600196137c7772cdae083c47b254833421e759f55d868d001f61dbff7f7ed800000000000000", 0x74}, {&(0x7f0000000080), 0x18}], 0x3, 0x0, 0x383cb33c882dcf01}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3, 0x8, 0x0, 0xfffffffe}, {0x1, 0x2, 0x1}]}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000000c0)=@tipc=@id={0x1e, 0x3, 0x1501c4612ab3e184, {0x4e24}}, 0x80, &(0x7f0000000640), 0x8, 0x0, 0x1e5}, 0xac8c2097d86ad64d) socket$kcm(0x29, 0x5, 0x0) 05:53:12 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x02', 0x200002, 0x0) 05:53:13 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x03', 0x200002, 0x0) 05:53:13 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x04', 0x200002, 0x0) 05:53:13 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\'', 0x200002, 0x0) 05:53:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c060000}, 0x0) 05:53:13 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2554.460963][T23045] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2554.853825][T23026] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2556.685563][T23105] IPVS: ftp: loaded support on port[0] = 21 [ 2556.951993][T23105] chnl_net:caif_netlink_parms(): no params data found [ 2557.097027][T23049] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:16 executing program 0: r0 = socket$kcm(0x2, 0x1, 0x84) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r2, 0xb}, 0x10) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000480), 0x8) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000800b8000699030004070500150005008178a8001600400001000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000100)) [ 2557.382116][T23108] sctp: [Deprecated]: syz-executor.0 (pid 23108) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2557.382116][T23108] Use struct sctp_sack_info instead [ 2557.488566][T23111] sctp: [Deprecated]: syz-executor.0 (pid 23111) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2557.488566][T23111] Use struct sctp_sack_info instead [ 2557.543250][T23105] bridge0: port 1(bridge_slave_0) entered blocking state [ 2557.559448][T23105] bridge0: port 1(bridge_slave_0) entered disabled state 05:53:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x28b, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:16 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x7000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2557.596564][T23105] device bridge_slave_0 entered promiscuous mode [ 2557.643881][T23105] bridge0: port 2(bridge_slave_1) entered blocking state [ 2557.667390][T23115] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2557.689986][T23105] bridge0: port 2(bridge_slave_1) entered disabled state [ 2557.744860][T23105] device bridge_slave_1 entered promiscuous mode [ 2558.767868][T23105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2558.798753][T23105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2558.810907][T23118] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2559.105349][T23105] team0: Port device team_slave_0 added [ 2559.166093][T23105] team0: Port device team_slave_1 added [ 2559.201243][T23119] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2559.514398][T23105] device hsr_slave_0 entered promiscuous mode [ 2559.561424][T23105] device hsr_slave_1 entered promiscuous mode [ 2559.599948][T23105] debugfs: Directory 'hsr0' with parent '/' already present! [ 2560.044180][T23105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2560.117427][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2560.127022][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2560.143282][T23105] 8021q: adding VLAN 0 to HW filter on device team0 [ 2560.158254][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2560.168683][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2560.178750][T10764] bridge0: port 1(bridge_slave_0) entered blocking state [ 2560.185901][T10764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2560.276035][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2560.285703][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2560.296044][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2560.306257][T10761] bridge0: port 2(bridge_slave_1) entered blocking state [ 2560.313403][T10761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2560.406820][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2560.427653][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2560.447799][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2560.459211][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2560.472434][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2560.483517][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2560.546445][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2560.556962][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2560.566816][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2560.626461][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2560.636376][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2560.652334][T23105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2560.738362][T23105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2561.052868][T23167] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2561.067699][T23167] CPU: 0 PID: 23167 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2561.075644][T23167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2561.085819][T23167] Call Trace: [ 2561.089132][T23167] dump_stack+0x172/0x1f0 [ 2561.093488][T23167] dump_header+0x10b/0x82d [ 2561.097919][T23167] oom_kill_process.cold+0x10/0x15 [ 2561.103049][T23167] out_of_memory+0x334/0x1340 [ 2561.107730][T23167] ? __sched_text_start+0x8/0x8 [ 2561.112581][T23167] ? oom_killer_disable+0x280/0x280 [ 2561.117788][T23167] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2561.123336][T23167] ? memcg_stat_show+0xc40/0xc40 [ 2561.128279][T23167] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2561.134079][T23167] ? cgroup_file_notify+0x140/0x1b0 [ 2561.139276][T23167] memory_max_write+0x262/0x3a0 [ 2561.144125][T23167] ? mem_cgroup_write+0x370/0x370 [ 2561.149147][T23167] ? lock_acquire+0x190/0x410 [ 2561.153822][T23167] ? kernfs_fop_write+0x227/0x480 [ 2561.159190][T23167] cgroup_file_write+0x241/0x790 [ 2561.164253][T23167] ? mem_cgroup_write+0x370/0x370 [ 2561.169273][T23167] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2561.174906][T23167] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2561.180532][T23167] kernfs_fop_write+0x2b8/0x480 [ 2561.185386][T23167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2561.191626][T23167] __vfs_write+0x8a/0x110 [ 2561.195949][T23167] ? kernfs_fop_open+0xd80/0xd80 [ 2561.200880][T23167] vfs_write+0x268/0x5d0 [ 2561.205121][T23167] ksys_write+0x14f/0x290 [ 2561.209446][T23167] ? __ia32_sys_read+0xb0/0xb0 [ 2561.214208][T23167] ? do_syscall_64+0x26/0x760 [ 2561.218882][T23167] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2561.224942][T23167] ? do_syscall_64+0x26/0x760 [ 2561.229616][T23167] __x64_sys_write+0x73/0xb0 [ 2561.234204][T23167] do_syscall_64+0xfa/0x760 [ 2561.238709][T23167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2561.244672][T23167] RIP: 0033:0x459a59 [ 2561.248566][T23167] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2561.268503][T23167] RSP: 002b:00007f4c9d1ecc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2561.276946][T23167] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2561.284915][T23167] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 2561.292884][T23167] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2561.300915][T23167] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c9d1ed6d4 [ 2561.308884][T23167] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2561.323587][T23167] memory: usage 6776kB, limit 0kB, failcnt 515 [ 2561.329982][T23167] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2561.337140][T23167] Memory cgroup stats for /syz4: [ 2561.337267][T23167] anon 4296704 [ 2561.337267][T23167] file 49152 [ 2561.337267][T23167] kernel_stack 65536 [ 2561.337267][T23167] slab 2285568 [ 2561.337267][T23167] sock 0 [ 2561.337267][T23167] shmem 221184 [ 2561.337267][T23167] file_mapped 0 [ 2561.337267][T23167] file_dirty 135168 [ 2561.337267][T23167] file_writeback 0 [ 2561.337267][T23167] anon_thp 4194304 [ 2561.337267][T23167] inactive_anon 135168 [ 2561.337267][T23167] active_anon 4296704 [ 2561.337267][T23167] inactive_file 16384 [ 2561.337267][T23167] active_file 12288 [ 2561.337267][T23167] unevictable 0 [ 2561.337267][T23167] slab_reclaimable 1486848 [ 2561.337267][T23167] slab_unreclaimable 798720 [ 2561.337267][T23167] pgfault 258423 [ 2561.337267][T23167] pgmajfault 0 [ 2561.337267][T23167] workingset_refault 0 [ 2561.337267][T23167] workingset_activate 0 [ 2561.337267][T23167] workingset_nodereclaim 0 [ 2561.337267][T23167] pgrefill 1643 [ 2561.337267][T23167] pgscan 7079 [ 2561.337267][T23167] pgsteal 3188 [ 2561.434727][T23167] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23166,uid=0 [ 2561.451451][T23167] Memory cgroup out of memory: Killed process 23166 (syz-executor.4) total-vm:72712kB, anon-rss:4240kB, file-rss:35832kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 2561.455593][ T1071] oom_reaper: reaped process 23166 (syz-executor.4), now anon-rss:0kB, file-rss:34872kB, shmem-rss:0kB 05:53:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:20 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x28c, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x8000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c070000}, 0x0) [ 2561.498863][T23105] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2561.545005][T23172] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2561.571640][T23105] CPU: 0 PID: 23105 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2561.579708][T23105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2561.579715][T23105] Call Trace: [ 2561.579737][T23105] dump_stack+0x172/0x1f0 [ 2561.579762][T23105] dump_header+0x10b/0x82d [ 2561.579773][T23105] ? oom_kill_process+0x94/0x3f0 [ 2561.579790][T23105] oom_kill_process.cold+0x10/0x15 [ 2561.579808][T23105] out_of_memory+0x334/0x1340 [ 2561.579822][T23105] ? lock_downgrade+0x920/0x920 [ 2561.579843][T23105] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2561.617781][T23105] ? oom_killer_disable+0x280/0x280 [ 2561.617811][T23105] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2561.617830][T23105] ? memcg_stat_show+0xc40/0xc40 [ 2561.644596][T23105] ? do_raw_spin_unlock+0x57/0x270 [ 2561.649719][T23105] ? _raw_spin_unlock+0x2d/0x50 [ 2561.649742][T23105] try_charge+0xf4b/0x1440 [ 2561.649766][T23105] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2561.649779][T23105] ? percpu_ref_tryget_live+0x111/0x290 [ 2561.649798][T23105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2561.649816][T23105] ? __kasan_check_read+0x11/0x20 [ 2561.649836][T23105] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2561.649855][T23105] mem_cgroup_try_charge+0x136/0x590 [ 2561.649878][T23105] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2561.698393][T23105] __handle_mm_fault+0x1f0d/0x4040 [ 2561.698422][T23105] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2561.698437][T23105] ? handle_mm_fault+0x292/0xaa0 [ 2561.698463][T23105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2561.720663][T23105] ? __kasan_check_read+0x11/0x20 [ 2561.725718][T23105] handle_mm_fault+0x3b7/0xaa0 [ 2561.730676][T23105] __do_page_fault+0x536/0xdd0 [ 2561.735463][T23105] do_page_fault+0x38/0x590 [ 2561.735485][T23105] page_fault+0x39/0x40 [ 2561.735506][T23105] RIP: 0033:0x4579f1 [ 2561.748201][T23105] Code: 48 81 ec 98 00 00 00 0f 05 48 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 00 48 89 e2 89 de bf 01 00 00 00 ba 13 00 00 85 c0 0f 88 98 00 00 00 8b 44 24 18 25 00 f0 00 00 [ 2561.768055][T23105] RSP: 002b:00007ffeabc58fb0 EFLAGS: 00010206 [ 2561.774376][T23105] RAX: 0000000000000003 RBX: 0000000000000003 RCX: 00000000004579d0 [ 2561.782362][T23105] RDX: 00007ffeabc58fb0 RSI: 0000000000000003 RDI: 0000000000000001 05:53:21 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2561.782371][T23105] RBP: 0000000000000002 R08: 0000000000000001 R09: 00000000012df940 [ 2561.782379][T23105] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffeabc5a190 [ 2561.782387][T23105] R13: 00007ffeabc5a180 R14: 0000000000000000 R15: 00007ffeabc5a190 05:53:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c080000}, 0x0) [ 2561.960096][T23105] memory: usage 2344kB, limit 0kB, failcnt 527 [ 2561.967694][T23105] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2561.996034][T23105] Memory cgroup stats for /syz4: [ 2561.996172][T23105] anon 40960 [ 2561.996172][T23105] file 49152 05:53:21 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x0f', 0x200002, 0x0) [ 2561.996172][T23105] kernel_stack 65536 [ 2561.996172][T23105] slab 2285568 [ 2561.996172][T23105] sock 0 [ 2561.996172][T23105] shmem 221184 [ 2561.996172][T23105] file_mapped 0 [ 2561.996172][T23105] file_dirty 135168 [ 2561.996172][T23105] file_writeback 0 [ 2561.996172][T23105] anon_thp 0 [ 2561.996172][T23105] inactive_anon 135168 [ 2561.996172][T23105] active_anon 40960 [ 2561.996172][T23105] inactive_file 16384 [ 2561.996172][T23105] active_file 12288 [ 2561.996172][T23105] unevictable 0 [ 2561.996172][T23105] slab_reclaimable 1486848 [ 2561.996172][T23105] slab_unreclaimable 798720 [ 2561.996172][T23105] pgfault 258423 [ 2561.996172][T23105] pgmajfault 0 [ 2561.996172][T23105] workingset_refault 0 [ 2561.996172][T23105] workingset_activate 0 [ 2561.996172][T23105] workingset_nodereclaim 0 [ 2561.996172][T23105] pgrefill 1643 [ 2561.996172][T23105] pgscan 7079 [ 2561.996172][T23105] pgsteal 3188 05:53:21 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2562.259966][T23105] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23105,uid=0 [ 2562.289876][T23105] Memory cgroup out of memory: Killed process 23105 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 05:53:21 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2562.452280][ T1071] oom_reaper: reaped process 23105 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 05:53:21 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2563.116759][T23176] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 05:53:22 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x88c}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff\x04\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xf8, 0x3f, 0x0, 0xdf, 0x0, 0x8000000000000000, 0x8, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000100), 0xc}, 0x220, 0x5, 0xffff, 0x3267bddf741cccbe, 0x4, 0x401, 0x81}, r3, 0xc, r4, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f00000001c0)=0x5) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0), 0x161) openat$cgroup_ro(r2, &(0x7f0000000940)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@ptr={0x8, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x30, 0xb0, 0xe6]}}, &(0x7f0000000280)=""/50, 0x29, 0x32}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000f070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000feffff64040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f0", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f00000004c0)=0x7) [ 2563.494843][T23178] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:22 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0d0000}, 0x0) 05:53:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) [ 2563.987878][T23266] ÿ: renamed from nr0 [ 2564.105189][T23184] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:23 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2564.481758][T23181] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xa000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x28d, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:24 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50010000}, 0x0) 05:53:24 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x88c}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff\x04\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xf8, 0x3f, 0x0, 0xdf, 0x0, 0x8000000000000000, 0x8, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000100), 0xc}, 0x220, 0x5, 0xffff, 0x3267bddf741cccbe, 0x4, 0x401, 0x81}, r3, 0xc, r4, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f00000001c0)=0x5) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0), 0x161) openat$cgroup_ro(r2, &(0x7f0000000940)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@ptr={0x8, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x30, 0xb0, 0xe6]}}, &(0x7f0000000280)=""/50, 0x29, 0x32}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000f070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000feffff64040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f0", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f00000004c0)=0x7) [ 2564.982741][T23281] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2565.036060][T23287] ÿ: renamed from nr0 05:53:24 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:24 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\xff', 0x200002, 0x0) 05:53:24 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\xff', 0x200002, 0x0) 05:53:24 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\xff', 0x200002, 0x0) 05:53:24 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2566.118815][T23296] IPVS: ftp: loaded support on port[0] = 21 [ 2566.205835][T23290] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2566.583537][T23288] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2567.063130][T23296] chnl_net:caif_netlink_parms(): no params data found [ 2567.162684][T23296] bridge0: port 1(bridge_slave_0) entered blocking state [ 2567.171419][T23296] bridge0: port 1(bridge_slave_0) entered disabled state [ 2567.181330][T23296] device bridge_slave_0 entered promiscuous mode [ 2567.265782][T23296] bridge0: port 2(bridge_slave_1) entered blocking state [ 2567.274875][T23296] bridge0: port 2(bridge_slave_1) entered disabled state [ 2567.285609][T23296] device bridge_slave_1 entered promiscuous mode [ 2567.318571][T23296] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2567.333382][T23296] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2567.434857][T23296] team0: Port device team_slave_0 added [ 2567.444362][T23296] team0: Port device team_slave_1 added [ 2567.594576][T23296] device hsr_slave_0 entered promiscuous mode [ 2567.671578][T23296] device hsr_slave_1 entered promiscuous mode [ 2567.709892][T23296] debugfs: Directory 'hsr0' with parent '/' already present! [ 2567.786135][T23296] bridge0: port 2(bridge_slave_1) entered blocking state [ 2567.793286][T23296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2567.800712][T23296] bridge0: port 1(bridge_slave_0) entered blocking state [ 2567.807805][T23296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2568.024049][T23296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2568.045425][T24866] bridge0: port 1(bridge_slave_0) entered disabled state [ 2568.056423][T24866] bridge0: port 2(bridge_slave_1) entered disabled state [ 2568.067379][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2568.080742][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2568.089607][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2568.146475][T23296] 8021q: adding VLAN 0 to HW filter on device team0 [ 2568.163955][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2568.175699][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2568.185347][ T1375] bridge0: port 1(bridge_slave_0) entered blocking state [ 2568.192478][ T1375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2568.313821][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2568.324067][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2568.333704][T24866] bridge0: port 2(bridge_slave_1) entered blocking state [ 2568.340903][T24866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2568.406770][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2568.419532][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2568.445653][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2568.458299][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2568.471482][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2568.482433][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2568.557547][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2568.568078][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2568.578143][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2568.595048][T23296] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2568.608062][T23296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2568.619614][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2568.630932][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2568.722831][T23296] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2568.979577][T23358] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2568.990475][T23358] CPU: 1 PID: 23358 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2568.998379][T23358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2569.008459][T23358] Call Trace: [ 2569.011758][T23358] dump_stack+0x172/0x1f0 [ 2569.016097][T23358] dump_header+0x10b/0x82d [ 2569.020520][T23358] oom_kill_process.cold+0x10/0x15 [ 2569.025631][T23358] out_of_memory+0x334/0x1340 [ 2569.030311][T23358] ? __sched_text_start+0x8/0x8 [ 2569.035162][T23358] ? oom_killer_disable+0x280/0x280 [ 2569.040371][T23358] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2569.045917][T23358] ? memcg_stat_show+0xc40/0xc40 [ 2569.050874][T23358] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2569.056681][T23358] ? cgroup_file_notify+0x140/0x1b0 [ 2569.061886][T23358] memory_max_write+0x262/0x3a0 [ 2569.066744][T23358] ? mem_cgroup_write+0x370/0x370 [ 2569.071769][T23358] ? lock_acquire+0x190/0x410 [ 2569.076445][T23358] ? kernfs_fop_write+0x227/0x480 [ 2569.081479][T23358] cgroup_file_write+0x241/0x790 [ 2569.086418][T23358] ? mem_cgroup_write+0x370/0x370 [ 2569.091441][T23358] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2569.097168][T23358] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2569.102802][T23358] kernfs_fop_write+0x2b8/0x480 [ 2569.107659][T23358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2569.113915][T23358] __vfs_write+0x8a/0x110 [ 2569.118244][T23358] ? kernfs_fop_open+0xd80/0xd80 [ 2569.123185][T23358] vfs_write+0x268/0x5d0 [ 2569.127435][T23358] ksys_write+0x14f/0x290 [ 2569.131771][T23358] ? __ia32_sys_read+0xb0/0xb0 [ 2569.136535][T23358] ? do_syscall_64+0x26/0x760 [ 2569.141214][T23358] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2569.147302][T23358] ? do_syscall_64+0x26/0x760 [ 2569.151998][T23358] __x64_sys_write+0x73/0xb0 [ 2569.156603][T23358] do_syscall_64+0xfa/0x760 [ 2569.161120][T23358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2569.167008][T23358] RIP: 0033:0x459a59 [ 2569.170908][T23358] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2569.190506][T23358] RSP: 002b:00007f9eff2a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2569.198897][T23358] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2569.206848][T23358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 2569.214800][T23358] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2569.222793][T23358] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9eff2a66d4 [ 2569.230878][T23358] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2569.255608][T23358] memory: usage 6784kB, limit 0kB, failcnt 528 [ 2569.262201][T23358] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2569.269056][T23358] Memory cgroup stats for /syz4: [ 2569.269175][T23358] anon 4308992 [ 2569.269175][T23358] file 49152 [ 2569.269175][T23358] kernel_stack 65536 [ 2569.269175][T23358] slab 2285568 [ 2569.269175][T23358] sock 0 [ 2569.269175][T23358] shmem 221184 [ 2569.269175][T23358] file_mapped 0 [ 2569.269175][T23358] file_dirty 135168 [ 2569.269175][T23358] file_writeback 0 [ 2569.269175][T23358] anon_thp 4194304 [ 2569.269175][T23358] inactive_anon 135168 [ 2569.269175][T23358] active_anon 4308992 [ 2569.269175][T23358] inactive_file 16384 [ 2569.269175][T23358] active_file 12288 [ 2569.269175][T23358] unevictable 0 [ 2569.269175][T23358] slab_reclaimable 1486848 [ 2569.269175][T23358] slab_unreclaimable 798720 [ 2569.269175][T23358] pgfault 258489 [ 2569.269175][T23358] pgmajfault 0 [ 2569.269175][T23358] workingset_refault 0 [ 2569.269175][T23358] workingset_activate 0 [ 2569.269175][T23358] workingset_nodereclaim 0 [ 2569.269175][T23358] pgrefill 1643 [ 2569.269175][T23358] pgscan 7079 [ 2569.269175][T23358] pgsteal 3188 [ 2569.364264][T23358] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23357,uid=0 [ 2569.381795][T23358] Memory cgroup out of memory: Killed process 23357 (syz-executor.4) total-vm:72712kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 2569.402767][ T1071] oom_reaper: reaped process 23357 (syz-executor.4), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 05:53:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50020000}, 0x0) 05:53:28 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\xeb', 0x200002, 0x0) 05:53:28 executing program 0: socketpair(0x22, 0x3, 0x3, &(0x7f0000000380)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@ptr={0x0, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x5f, 0x2e, 0x0, 0x5f, 0x5f, 0x31c2443f27f146ed, 0x2e, 0x2e, 0x0]}}, &(0x7f00000003c0)=""/4096, 0x2f, 0x1000}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb2, 0xb2, 0x5, [@const={0xc, 0x0, 0x0, 0xa, 0x4}, @datasec={0x1, 0x2, 0x0, 0xf, 0x2, [{0x3, 0x4, 0x5e7d}, {0x5, 0x400, 0x6}], '4;'}, @union={0x1, 0x1, 0x0, 0x5, 0x0, 0x1, [{0x4, 0x4, 0x7fff}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x80000000}}, @enum={0xd, 0x3, 0x0, 0x6, 0x4, [{0x2, 0x17c00000}, {0x5}, {0xf, 0x3}]}, @func={0x8, 0x0, 0x0, 0xc, 0x2}, @fwd={0xc}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb, 0x3}]}]}, {0x0, [0x1d7f282c3251f76a, 0x5f, 0x61]}}, &(0x7f0000000180)=""/3, 0xd1, 0x3, 0x1}, 0x20) 05:53:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xe000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:28 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x28e, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2569.531927][T23296] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2569.563679][T23365] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2569.574523][T23296] CPU: 0 PID: 23296 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2569.574533][T23296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2569.574538][T23296] Call Trace: [ 2569.574561][T23296] dump_stack+0x172/0x1f0 [ 2569.574584][T23296] dump_header+0x10b/0x82d [ 2569.574596][T23296] ? oom_kill_process+0x94/0x3f0 [ 2569.574614][T23296] oom_kill_process.cold+0x10/0x15 [ 2569.574632][T23296] out_of_memory+0x334/0x1340 [ 2569.574648][T23296] ? lock_downgrade+0x920/0x920 [ 2569.574668][T23296] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2569.574684][T23296] ? oom_killer_disable+0x280/0x280 [ 2569.574709][T23296] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2569.574724][T23296] ? memcg_stat_show+0xc40/0xc40 [ 2569.574743][T23296] ? do_raw_spin_unlock+0x57/0x270 [ 2569.574759][T23296] ? _raw_spin_unlock+0x2d/0x50 [ 2569.574778][T23296] try_charge+0xf4b/0x1440 [ 2569.574804][T23296] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2569.574818][T23296] ? percpu_ref_tryget_live+0x111/0x290 [ 2569.574836][T23296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2569.574853][T23296] ? __kasan_check_read+0x11/0x20 [ 2569.574880][T23296] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2569.635303][T23296] mem_cgroup_try_charge+0x136/0x590 [ 2569.635329][T23296] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2569.635348][T23296] wp_page_copy+0x407/0x1860 [ 2569.635366][T23296] ? find_held_lock+0x35/0x130 [ 2569.635381][T23296] ? do_wp_page+0x53b/0x15c0 [ 2569.635399][T23296] ? pmd_devmap_trans_unstable+0x220/0x220 [ 2569.635415][T23296] ? lock_downgrade+0x920/0x920 [ 2569.635433][T23296] ? swp_swapcount+0x540/0x540 05:53:28 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\xf6', 0x200002, 0x0) [ 2569.665760][T23296] ? __kasan_check_read+0x11/0x20 [ 2569.665776][T23296] ? do_raw_spin_unlock+0x57/0x270 [ 2569.665796][T23296] do_wp_page+0x543/0x15c0 [ 2569.665816][T23296] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 2569.665839][T23296] __handle_mm_fault+0x23ec/0x4040 [ 2569.665859][T23296] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2569.699072][T23296] ? handle_mm_fault+0x292/0xaa0 [ 2569.699104][T23296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2569.699121][T23296] ? __kasan_check_read+0x11/0x20 [ 2569.699141][T23296] handle_mm_fault+0x3b7/0xaa0 [ 2569.699163][T23296] __do_page_fault+0x536/0xdd0 [ 2569.699184][T23296] do_page_fault+0x38/0x590 [ 2569.723836][T23296] page_fault+0x39/0x40 [ 2569.723849][T23296] RIP: 0033:0x430b36 [ 2569.723868][T23296] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 2569.748484][T23296] RSP: 002b:00007fffaea68480 EFLAGS: 00010206 [ 2569.748497][T23296] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 05:53:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\xfe', 0x200002, 0x0) 05:53:29 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x191, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r4, 0x10e, 0xb, &(0x7f0000000000), 0x3) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = gettid() r6 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r3, 0x0, 0x1ff) socket$kcm(0x11, 0x7, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x9, 0x3, 0xd8, 0x0}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) openat$cgroup_int(r7, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffe15) socket$kcm(0xa, 0x6, 0x0) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg(r6, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x3da, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffe0e, 0x0, &(0x7f0000000400)="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"}, 0xfdf5) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r9 = perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x2, 0x3f, 0x7f, 0xe7, 0x0, 0x8, 0x10000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x55, 0x3, @perf_config_ext={0x4, 0x8}, 0x10804, 0x1, 0x2, 0xd202d02d2e0126e8, 0x5, 0x9, 0x7ff}, r5, 0x4, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r0, 0x0, 0xe, &(0x7f00000000c0)='./cgroup/syz1\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, r10, 0xbfffffffffffffff, r9, 0x2) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 2569.748505][T23296] RDX: 0000000000f04930 RSI: 0000000000f0c970 RDI: 0000000000000003 [ 2569.748514][T23296] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000f03940 [ 2569.748522][T23296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 2569.748531][T23296] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 2569.849919][T23296] memory: usage 2356kB, limit 0kB, failcnt 536 [ 2570.020081][T23296] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2570.030327][T23296] Memory cgroup stats for /syz4: [ 2570.030423][T23296] anon 61440 [ 2570.030423][T23296] file 49152 [ 2570.030423][T23296] kernel_stack 65536 [ 2570.030423][T23296] slab 2285568 [ 2570.030423][T23296] sock 0 [ 2570.030423][T23296] shmem 221184 [ 2570.030423][T23296] file_mapped 0 [ 2570.030423][T23296] file_dirty 135168 [ 2570.030423][T23296] file_writeback 0 [ 2570.030423][T23296] anon_thp 0 [ 2570.030423][T23296] inactive_anon 135168 [ 2570.030423][T23296] active_anon 61440 [ 2570.030423][T23296] inactive_file 16384 [ 2570.030423][T23296] active_file 12288 [ 2570.030423][T23296] unevictable 0 [ 2570.030423][T23296] slab_reclaimable 1486848 [ 2570.030423][T23296] slab_unreclaimable 798720 [ 2570.030423][T23296] pgfault 258489 [ 2570.030423][T23296] pgmajfault 0 [ 2570.030423][T23296] workingset_refault 0 [ 2570.030423][T23296] workingset_activate 0 [ 2570.030423][T23296] workingset_nodereclaim 0 [ 2570.030423][T23296] pgrefill 1643 [ 2570.030423][T23296] pgscan 7079 [ 2570.030423][T23296] pgsteal 3188 [ 2570.046945][T23404] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. 05:53:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2570.244752][T23296] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23296,uid=0 05:53:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2570.278552][T23296] Memory cgroup out of memory: Killed process 23296 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 2570.310307][T23404] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2570.318601][ T1071] oom_reaper: reaped process 23296 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 05:53:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2570.792260][T23404] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2570.811405][T23404] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 05:53:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50030000}, 0x0) 05:53:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2571.327647][T23370] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x10000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2571.879531][T23390] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2572.201644][T23454] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x28f, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:31 executing program 0: socket$kcm(0x2, 0x20000000002, 0x73) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x20) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x5, &(0x7f0000000100)=[{0x20, 0x63, 0x9}, {0x0, 0x1, 0x8, 0x87}, {0x2, 0x20, 0x9, 0x80000000}, {0x0, 0x3, 0x9, 0x9}, {0x80, 0x80, 0x70, 0x7fff}]}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xbcd8781b067b5e83) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="51c880468d1dfd8580feb0818202a38b627a2ab693fa9326fc390a2bd9f5"], 0x1e) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x2d, 'cpu'}, {0x2d, 'cpu'}]}, 0xa) write$cgroup_pid(r2, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) 05:53:31 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54000000}, 0x0) 05:53:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:32 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:32 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:32 executing program 0: r0 = socket$kcm(0x10, 0x20000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffea2, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008104e00f80ecdb4cb9040a1d65ef0b007c055644d14819f8ac050300069903000000160005000700812fa8001600030063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f87f5730d16b8683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40ff040000e04adcdf634ce4e11df7c82a9ccbee5de6e4edee3d93452a92954b43370e970300000000b8d0d1e1c0", 0x94}], 0x1}, 0x0) [ 2573.353822][T23479] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x1f000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:32 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf9f0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='wlan0\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f00000001c0)='memory.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r5 = socket$kcm(0x29, 0xa, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)={r5, r6}) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="f5b2878d000087c9757485ea4604dcb640eb41b01d9aa27c0f45ae1cc75e80550a7caff0877b308e83ab76d9141c3b80cab67cc843cabd13dc3d8365bc2817a86159b3b73f15015713764872052d2f9d808b6c7d47f30400ebab07f9d7927fa16f1b12b900650e4333217624aa0f89e7d21ad7465d7368f0e1553151956138f3550a9a8cb1b5b7985b9d5f09f8cde45a23bfaa6bf62362d7049e04b7b3"], 0xfdef) [ 2573.921026][T23534] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x290, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:33 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2574.530945][T23547] IPVS: ftp: loaded support on port[0] = 21 [ 2574.590191][T23551] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2575.140119][T23535] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2575.512547][T23553] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2575.853792][T23547] chnl_net:caif_netlink_parms(): no params data found [ 2575.955964][T23547] bridge0: port 1(bridge_slave_0) entered blocking state [ 2575.965022][T23547] bridge0: port 1(bridge_slave_0) entered disabled state [ 2575.976698][T23547] device bridge_slave_0 entered promiscuous mode [ 2575.986380][T23547] bridge0: port 2(bridge_slave_1) entered blocking state [ 2575.994135][T23547] bridge0: port 2(bridge_slave_1) entered disabled state [ 2576.003693][T23547] device bridge_slave_1 entered promiscuous mode [ 2576.079363][T23547] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2576.144630][T23547] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2576.175354][T23547] team0: Port device team_slave_0 added [ 2576.252893][T23547] team0: Port device team_slave_1 added [ 2576.314462][T23547] device hsr_slave_0 entered promiscuous mode [ 2576.351441][T23547] device hsr_slave_1 entered promiscuous mode [ 2576.390000][T23547] debugfs: Directory 'hsr0' with parent '/' already present! [ 2576.485855][T23547] bridge0: port 2(bridge_slave_1) entered blocking state [ 2576.492993][T23547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2576.500419][T23547] bridge0: port 1(bridge_slave_0) entered blocking state [ 2576.507483][T23547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2576.717311][T23547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2576.792789][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2576.802920][ T1375] bridge0: port 1(bridge_slave_0) entered disabled state [ 2576.812035][ T1375] bridge0: port 2(bridge_slave_1) entered disabled state [ 2576.822547][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2576.838836][T23547] 8021q: adding VLAN 0 to HW filter on device team0 [ 2576.925197][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2576.935619][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2576.945227][T10764] bridge0: port 1(bridge_slave_0) entered blocking state [ 2576.952373][T10764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2577.008043][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2577.019201][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2577.029066][T10760] bridge0: port 2(bridge_slave_1) entered blocking state [ 2577.036208][T10760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2577.109695][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2577.133766][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2577.144582][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2577.155413][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2577.178720][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2577.188502][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2577.199323][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2577.220984][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2577.232235][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2577.241844][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2577.252361][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2577.265805][T23547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2577.368938][T23547] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2577.744576][T23591] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2577.755242][T23591] CPU: 1 PID: 23591 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2577.763148][T23591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2577.773209][T23591] Call Trace: [ 2577.776514][T23591] dump_stack+0x172/0x1f0 [ 2577.780871][T23591] dump_header+0x10b/0x82d [ 2577.785296][T23591] oom_kill_process.cold+0x10/0x15 [ 2577.790412][T23591] out_of_memory+0x334/0x1340 [ 2577.795094][T23591] ? __sched_text_start+0x8/0x8 [ 2577.799945][T23591] ? oom_killer_disable+0x280/0x280 [ 2577.805171][T23591] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2577.810719][T23591] ? memcg_stat_show+0xc40/0xc40 [ 2577.815664][T23591] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2577.821477][T23591] ? cgroup_file_notify+0x140/0x1b0 [ 2577.826679][T23591] memory_max_write+0x262/0x3a0 [ 2577.831537][T23591] ? mem_cgroup_write+0x370/0x370 [ 2577.836561][T23591] ? lock_acquire+0x190/0x410 [ 2577.841243][T23591] ? kernfs_fop_write+0x227/0x480 [ 2577.846284][T23591] cgroup_file_write+0x241/0x790 [ 2577.851224][T23591] ? mem_cgroup_write+0x370/0x370 [ 2577.856252][T23591] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2577.861901][T23591] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2577.867545][T23591] kernfs_fop_write+0x2b8/0x480 [ 2577.872400][T23591] __vfs_write+0x8a/0x110 [ 2577.876730][T23591] ? kernfs_fop_open+0xd80/0xd80 [ 2577.881670][T23591] vfs_write+0x268/0x5d0 [ 2577.885917][T23591] ksys_write+0x14f/0x290 [ 2577.890252][T23591] ? __ia32_sys_read+0xb0/0xb0 [ 2577.895021][T23591] ? do_syscall_64+0x26/0x760 [ 2577.899696][T23591] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2577.905762][T23591] ? do_syscall_64+0x26/0x760 [ 2577.910465][T23591] __x64_sys_write+0x73/0xb0 [ 2577.915080][T23591] do_syscall_64+0xfa/0x760 [ 2577.919598][T23591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2577.925495][T23591] RIP: 0033:0x459a59 [ 2577.929395][T23591] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2577.949010][T23591] RSP: 002b:00007f2dcd8c8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2577.957431][T23591] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2577.965407][T23591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 2577.973385][T23591] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2577.981380][T23591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2dcd8c96d4 [ 2577.989351][T23591] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2578.012752][T23591] memory: usage 6744kB, limit 0kB, failcnt 537 [ 2578.019296][T23591] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2578.027019][T23591] Memory cgroup stats for /syz4: [ 2578.027627][T23591] anon 4259840 [ 2578.027627][T23591] file 49152 [ 2578.027627][T23591] kernel_stack 65536 [ 2578.027627][T23591] slab 2285568 [ 2578.027627][T23591] sock 0 [ 2578.027627][T23591] shmem 221184 [ 2578.027627][T23591] file_mapped 0 [ 2578.027627][T23591] file_dirty 135168 [ 2578.027627][T23591] file_writeback 0 [ 2578.027627][T23591] anon_thp 4194304 [ 2578.027627][T23591] inactive_anon 135168 [ 2578.027627][T23591] active_anon 4259840 [ 2578.027627][T23591] inactive_file 16384 [ 2578.027627][T23591] active_file 12288 [ 2578.027627][T23591] unevictable 0 [ 2578.027627][T23591] slab_reclaimable 1486848 [ 2578.027627][T23591] slab_unreclaimable 798720 [ 2578.027627][T23591] pgfault 258522 [ 2578.027627][T23591] pgmajfault 0 [ 2578.027627][T23591] workingset_refault 0 [ 2578.027627][T23591] workingset_activate 0 [ 2578.027627][T23591] workingset_nodereclaim 0 [ 2578.027627][T23591] pgrefill 1643 [ 2578.027627][T23591] pgscan 7079 [ 2578.027627][T23591] pgsteal 3188 [ 2578.123557][T23591] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23590,uid=0 [ 2578.140593][T23591] Memory cgroup out of memory: Killed process 23590 (syz-executor.4) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 2578.164489][ T1071] oom_reaper: reaped process 23590 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 05:53:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54050000}, 0x0) 05:53:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:53:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x0, 'pids'}, {0x2d, '\xff\x03\x00\x00'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'io'}]}, 0x1a9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) 05:53:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x20000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x291, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2578.313545][T23547] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2578.339367][T23596] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2578.352761][T23547] CPU: 0 PID: 23547 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2578.360692][T23547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2578.370762][T23547] Call Trace: [ 2578.374058][T23547] dump_stack+0x172/0x1f0 [ 2578.378387][T23547] dump_header+0x10b/0x82d [ 2578.382790][T23547] ? oom_kill_process+0x94/0x3f0 [ 2578.387721][T23547] oom_kill_process.cold+0x10/0x15 [ 2578.392821][T23547] out_of_memory+0x334/0x1340 [ 2578.397484][T23547] ? lock_downgrade+0x920/0x920 [ 2578.402323][T23547] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2578.408116][T23547] ? oom_killer_disable+0x280/0x280 [ 2578.413310][T23547] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2578.418842][T23547] ? memcg_stat_show+0xc40/0xc40 [ 2578.423771][T23547] ? do_raw_spin_unlock+0x57/0x270 [ 2578.428871][T23547] ? _raw_spin_unlock+0x2d/0x50 [ 2578.433727][T23547] try_charge+0xf4b/0x1440 [ 2578.438140][T23547] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2578.443669][T23547] ? percpu_ref_tryget_live+0x111/0x290 [ 2578.449202][T23547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2578.455430][T23547] ? __kasan_check_read+0x11/0x20 [ 2578.460632][T23547] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2578.466168][T23547] mem_cgroup_try_charge+0x136/0x590 [ 2578.471448][T23547] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2578.477083][T23547] __handle_mm_fault+0x1f0d/0x4040 [ 2578.482188][T23547] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2578.487724][T23547] ? handle_mm_fault+0x292/0xaa0 [ 2578.492659][T23547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2578.498888][T23547] ? __kasan_check_read+0x11/0x20 [ 2578.503922][T23547] handle_mm_fault+0x3b7/0xaa0 [ 2578.508677][T23547] __do_page_fault+0x536/0xdd0 [ 2578.513442][T23547] do_page_fault+0x38/0x590 [ 2578.517936][T23547] page_fault+0x39/0x40 [ 2578.522077][T23547] RIP: 0033:0x42ffac [ 2578.525974][T23547] Code: 83 c0 17 41 55 41 54 55 53 48 89 c5 48 83 e5 f0 48 89 fb 48 81 ec 98 00 00 00 48 83 f8 20 b8 20 00 00 00 48 0f 42 e8 48 85 ff <48> 89 74 24 08 0f 84 3a 08 00 00 48 3b 2d ba 4f 64 00 77 70 89 ef [ 2578.545560][T23547] RSP: 002b:00007fff170d3fc0 EFLAGS: 00010202 [ 2578.551614][T23547] RAX: 0000000000000020 RBX: 0000000000716640 RCX: 0000000000458dc4 [ 2578.559570][T23547] RDX: 00007fff170d40b0 RSI: 0000000000008030 RDI: 0000000000716640 [ 2578.567527][T23547] RBP: 0000000000008040 R08: 0000000000000001 R09: 0000000002307940 [ 2578.575484][T23547] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff170d5290 [ 2578.583439][T23547] R13: 00007fff170d5280 R14: 0000000000000000 R15: 00007fff170d5290 05:53:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200003, 0x0) [ 2578.770307][T23547] memory: usage 2360kB, limit 0kB, failcnt 545 [ 2578.778572][T23547] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2578.818185][T23547] Memory cgroup stats for /syz4: [ 2578.818292][T23547] anon 49152 [ 2578.818292][T23547] file 49152 [ 2578.818292][T23547] kernel_stack 0 [ 2578.818292][T23547] slab 2285568 [ 2578.818292][T23547] sock 0 [ 2578.818292][T23547] shmem 221184 [ 2578.818292][T23547] file_mapped 0 [ 2578.818292][T23547] file_dirty 135168 [ 2578.818292][T23547] file_writeback 0 [ 2578.818292][T23547] anon_thp 0 [ 2578.818292][T23547] inactive_anon 135168 [ 2578.818292][T23547] active_anon 49152 [ 2578.818292][T23547] inactive_file 16384 [ 2578.818292][T23547] active_file 12288 [ 2578.818292][T23547] unevictable 0 [ 2578.818292][T23547] slab_reclaimable 1486848 [ 2578.818292][T23547] slab_unreclaimable 798720 [ 2578.818292][T23547] pgfault 258522 [ 2578.818292][T23547] pgmajfault 0 [ 2578.818292][T23547] workingset_refault 0 [ 2578.818292][T23547] workingset_activate 0 [ 2578.818292][T23547] workingset_nodereclaim 0 [ 2578.818292][T23547] pgrefill 1643 [ 2578.818292][T23547] pgscan 7079 [ 2578.818292][T23547] pgsteal 3188 [ 2578.818292][T23547] pgactivate 2805 05:53:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x20000f, 0x0) [ 2578.957320][T23547] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23547,uid=0 [ 2578.973114][T23547] Memory cgroup out of memory: Killed process 23547 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 2579.005773][ T1071] oom_reaper: reaped process 23547 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 05:53:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r3, r4}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x4926, &(0x7f0000000040), 0x10000189}, 0x0) 05:53:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200010, 0x0) 05:53:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x2) 05:53:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x3) 05:53:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x4) 05:53:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54060000}, 0x0) 05:53:39 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\x05\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2580.135025][T23599] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x22e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2580.773557][T23602] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2582.847245][T23691] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x292, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x27) 05:53:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:53:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54090000}, 0x0) 05:53:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x300) 05:53:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x2700) 05:53:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x3f00) 05:53:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x4000) 05:53:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xff0f) 05:53:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x1000000) [ 2585.318209][T23770] IPVS: ftp: loaded support on port[0] = 21 [ 2585.346057][T23694] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x2000000) [ 2585.743562][T23725] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x23e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2586.172708][T23730] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2586.524649][T23770] chnl_net:caif_netlink_parms(): no params data found [ 2586.656969][T23778] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x293, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 2587.061522][T23770] bridge0: port 1(bridge_slave_0) entered blocking state [ 2587.061560][T23770] bridge0: port 1(bridge_slave_0) entered disabled state [ 2587.095966][T23770] device bridge_slave_0 entered promiscuous mode [ 2587.113547][T23770] bridge0: port 2(bridge_slave_1) entered blocking state [ 2587.121308][T23770] bridge0: port 2(bridge_slave_1) entered disabled state [ 2587.140660][T23770] device bridge_slave_1 entered promiscuous mode [ 2587.167373][T23800] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2587.813335][T23770] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2587.847256][T23770] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2587.857922][T23798] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2588.238999][T23770] team0: Port device team_slave_0 added [ 2588.259495][T23770] team0: Port device team_slave_1 added [ 2588.267593][T23817] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2588.604412][T23770] device hsr_slave_0 entered promiscuous mode [ 2588.641597][T23770] device hsr_slave_1 entered promiscuous mode [ 2588.709919][T23770] debugfs: Directory 'hsr0' with parent '/' already present! [ 2588.770268][T23805] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2589.333019][T23770] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2589.355081][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2589.364560][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2589.382192][T23770] 8021q: adding VLAN 0 to HW filter on device team0 [ 2589.398942][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2589.410720][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2589.421150][ T8864] bridge0: port 1(bridge_slave_0) entered blocking state [ 2589.428219][ T8864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2589.505653][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2589.515049][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2589.525469][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2589.535480][T10760] bridge0: port 2(bridge_slave_1) entered blocking state [ 2589.542616][T10760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2589.682102][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2589.710599][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2589.741593][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2589.753042][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2589.762845][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2589.773954][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2589.862990][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2589.872659][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2589.882954][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2589.975249][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2590.002653][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2590.014372][T23770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2590.116976][T23770] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2590.457672][T23837] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2590.470982][T23837] CPU: 0 PID: 23837 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2590.478928][T23837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2590.488995][T23837] Call Trace: [ 2590.492303][T23837] dump_stack+0x172/0x1f0 [ 2590.496656][T23837] dump_header+0x10b/0x82d [ 2590.501092][T23837] oom_kill_process.cold+0x10/0x15 [ 2590.506220][T23837] out_of_memory+0x334/0x1340 [ 2590.510917][T23837] ? __sched_text_start+0x8/0x8 [ 2590.515782][T23837] ? oom_killer_disable+0x280/0x280 [ 2590.521045][T23837] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2590.526605][T23837] ? memcg_stat_show+0xc40/0xc40 [ 2590.531565][T23837] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2590.537383][T23837] ? cgroup_file_notify+0x140/0x1b0 [ 2590.542598][T23837] memory_max_write+0x262/0x3a0 [ 2590.547472][T23837] ? mem_cgroup_write+0x370/0x370 [ 2590.552497][T23837] ? lock_acquire+0x190/0x410 [ 2590.557611][T23837] ? kernfs_fop_write+0x227/0x480 [ 2590.562641][T23837] cgroup_file_write+0x241/0x790 [ 2590.567574][T23837] ? mem_cgroup_write+0x370/0x370 [ 2590.572590][T23837] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2590.578225][T23837] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2590.583868][T23837] kernfs_fop_write+0x2b8/0x480 [ 2590.588713][T23837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2590.594952][T23837] __vfs_write+0x8a/0x110 [ 2590.599291][T23837] ? kernfs_fop_open+0xd80/0xd80 [ 2590.604240][T23837] vfs_write+0x268/0x5d0 [ 2590.608480][T23837] ksys_write+0x14f/0x290 [ 2590.612802][T23837] ? __ia32_sys_read+0xb0/0xb0 [ 2590.617581][T23837] ? do_syscall_64+0x26/0x760 [ 2590.622249][T23837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2590.628301][T23837] ? do_syscall_64+0x26/0x760 [ 2590.632974][T23837] __x64_sys_write+0x73/0xb0 [ 2590.637571][T23837] do_syscall_64+0xfa/0x760 [ 2590.642087][T23837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2590.647970][T23837] RIP: 0033:0x459a59 [ 2590.651854][T23837] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2590.671446][T23837] RSP: 002b:00007fb5960b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2590.679845][T23837] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2590.687804][T23837] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 2590.695763][T23837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2590.703723][T23837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5960b46d4 [ 2590.711681][T23837] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2590.731639][T23837] memory: usage 6820kB, limit 0kB, failcnt 546 [ 2590.739271][T23837] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2590.746407][T23837] Memory cgroup stats for /syz4: [ 2590.746518][T23837] anon 4251648 [ 2590.746518][T23837] file 49152 [ 2590.746518][T23837] kernel_stack 65536 [ 2590.746518][T23837] slab 2285568 [ 2590.746518][T23837] sock 0 [ 2590.746518][T23837] shmem 221184 [ 2590.746518][T23837] file_mapped 0 [ 2590.746518][T23837] file_dirty 135168 [ 2590.746518][T23837] file_writeback 0 [ 2590.746518][T23837] anon_thp 4194304 [ 2590.746518][T23837] inactive_anon 135168 [ 2590.746518][T23837] active_anon 4251648 [ 2590.746518][T23837] inactive_file 16384 [ 2590.746518][T23837] active_file 12288 [ 2590.746518][T23837] unevictable 0 [ 2590.746518][T23837] slab_reclaimable 1486848 [ 2590.746518][T23837] slab_unreclaimable 798720 [ 2590.746518][T23837] pgfault 258621 [ 2590.746518][T23837] pgmajfault 0 [ 2590.746518][T23837] workingset_refault 0 [ 2590.746518][T23837] workingset_activate 0 [ 2590.746518][T23837] workingset_nodereclaim 0 [ 2590.746518][T23837] pgrefill 1643 [ 2590.746518][T23837] pgscan 7079 [ 2590.746518][T23837] pgsteal 3188 [ 2590.844569][T23837] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23836,uid=0 [ 2590.880320][T23837] Memory cgroup out of memory: Killed process 23836 (syz-executor.4) total-vm:72844kB, anon-rss:4252kB, file-rss:35828kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 2590.901477][ T1071] oom_reaper: reaped process 23836 (syz-executor.4), now anon-rss:0kB, file-rss:34872kB, shmem-rss:0kB 05:53:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r4 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r2, 0x0, 0x0) 05:53:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x540a0000}, 0x0) 05:53:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x3000000) 05:53:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x24e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 05:53:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x294, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2590.999340][T23770] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2591.031922][T23846] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2591.033257][T23849] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2591.058069][T23770] CPU: 1 PID: 23770 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2591.066001][T23770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2591.076055][T23770] Call Trace: [ 2591.079360][T23770] dump_stack+0x172/0x1f0 [ 2591.080348][T23846] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2591.083694][T23770] dump_header+0x10b/0x82d [ 2591.083708][T23770] ? oom_kill_process+0x94/0x3f0 [ 2591.083723][T23770] oom_kill_process.cold+0x10/0x15 [ 2591.083740][T23770] out_of_memory+0x334/0x1340 [ 2591.109106][T23770] ? lock_downgrade+0x920/0x920 [ 2591.109127][T23770] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2591.109145][T23770] ? oom_killer_disable+0x280/0x280 [ 2591.109177][T23770] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2591.135188][T23770] ? memcg_stat_show+0xc40/0xc40 [ 2591.140141][T23770] ? do_raw_spin_unlock+0x57/0x270 [ 2591.145264][T23770] ? _raw_spin_unlock+0x2d/0x50 [ 2591.150134][T23770] try_charge+0xf4b/0x1440 [ 2591.154569][T23770] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2591.160119][T23770] ? percpu_ref_tryget_live+0x111/0x290 [ 2591.165677][T23770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2591.171918][T23770] ? __kasan_check_read+0x11/0x20 [ 2591.171938][T23770] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2591.171955][T23770] mem_cgroup_try_charge+0x136/0x590 [ 2591.171974][T23770] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2591.171992][T23770] wp_page_copy+0x407/0x1860 05:53:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x4000000) [ 2591.172009][T23770] ? find_held_lock+0x35/0x130 [ 2591.172024][T23770] ? do_wp_page+0x53b/0x15c0 [ 2591.172042][T23770] ? pmd_devmap_trans_unstable+0x220/0x220 [ 2591.172057][T23770] ? lock_downgrade+0x920/0x920 [ 2591.172074][T23770] ? swp_swapcount+0x540/0x540 [ 2591.172089][T23770] ? __kasan_check_read+0x11/0x20 [ 2591.172100][T23770] ? do_raw_spin_unlock+0x57/0x270 [ 2591.172115][T23770] do_wp_page+0x543/0x15c0 [ 2591.172134][T23770] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 2591.193569][T23770] __handle_mm_fault+0x23ec/0x4040 [ 2591.193591][T23770] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2591.193610][T23770] ? handle_mm_fault+0x292/0xaa0 [ 2591.202962][T23770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2591.202981][T23770] ? __kasan_check_read+0x11/0x20 [ 2591.203001][T23770] handle_mm_fault+0x3b7/0xaa0 [ 2591.213375][T23770] __do_page_fault+0x536/0xdd0 [ 2591.213400][T23770] do_page_fault+0x38/0x590 [ 2591.213420][T23770] page_fault+0x39/0x40 [ 2591.279147][T23770] RIP: 0033:0x403522 [ 2591.279164][T23770] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 2591.279173][T23770] RSP: 002b:00007ffe5e1bdd50 EFLAGS: 00010246 [ 2591.279185][T23770] RAX: 0000000000000000 RBX: 00000000002786c9 RCX: 0000000000413660 [ 2591.279194][T23770] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe5e1bee80 [ 2591.279207][T23770] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000232b940 [ 2591.301346][T23846] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2591.311331][T23770] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe5e1bee80 [ 2591.311340][T23770] R13: 00007ffe5e1bee70 R14: 0000000000000000 R15: 00007ffe5e1bee80 [ 2591.410843][T23846] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2591.459877][T23770] memory: usage 2360kB, limit 0kB, failcnt 554 [ 2591.470790][T23770] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2591.515269][T23770] Memory cgroup stats for /syz4: [ 2591.515361][T23770] anon 65536 [ 2591.515361][T23770] file 49152 [ 2591.515361][T23770] kernel_stack 0 [ 2591.515361][T23770] slab 2285568 [ 2591.515361][T23770] sock 0 [ 2591.515361][T23770] shmem 221184 [ 2591.515361][T23770] file_mapped 0 [ 2591.515361][T23770] file_dirty 135168 [ 2591.515361][T23770] file_writeback 0 [ 2591.515361][T23770] anon_thp 0 [ 2591.515361][T23770] inactive_anon 135168 [ 2591.515361][T23770] active_anon 65536 [ 2591.515361][T23770] inactive_file 16384 05:53:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x540c0000}, 0x0) [ 2591.515361][T23770] active_file 12288 [ 2591.515361][T23770] unevictable 0 [ 2591.515361][T23770] slab_reclaimable 1486848 [ 2591.515361][T23770] slab_unreclaimable 798720 [ 2591.515361][T23770] pgfault 258621 [ 2591.515361][T23770] pgmajfault 0 [ 2591.515361][T23770] workingset_refault 0 [ 2591.515361][T23770] workingset_activate 0 [ 2591.515361][T23770] workingset_nodereclaim 0 [ 2591.515361][T23770] pgrefill 1643 [ 2591.515361][T23770] pgscan 7079 [ 2591.515361][T23770] pgsteal 3188 [ 2591.515361][T23770] pgactivate 2805 05:53:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x27000000) [ 2591.616623][T23770] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23770,uid=0 [ 2591.633672][T23770] Memory cgroup out of memory: Killed process 23770 (syz-executor.4) total-vm:72448kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 2591.654731][ T1071] oom_reaper: reaped process 23770 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 05:53:50 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xbe\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x40000000000, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x200000000005, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="7b189fd38c69e6783972", 0xa}, {&(0x7f0000000240)}], 0x2}, 0x4) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xfff4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="ff0100000000000809a5ebc096d72bbe76e662768cb22ff86cb2c94a2b7caabf5acc98ff59f5a791915f7f7a9cdfa146c9542d3c2582a807b6fa6871da183f3301103f59323f602f3c597630c3dfd897fab1e2aaecb46c6afc4df81190d93ea804d0407b654f3f922db6c097c247a456b469e4fd8c219049a7f89280a321f115250d19"], 0xfdef) 05:53:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x3f000000) 05:53:51 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x40000000) [ 2592.661223][T23847] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r4 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r2, 0x0, 0x0) 05:53:52 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xebffffff) 05:53:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58010000}, 0x0) [ 2593.287522][T23869] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x25e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:52 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xf6ffffff) [ 2593.611452][T23850] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x295, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x3a) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000540)={0x5, 0x70, 0x8, 0x2, 0x81, 0x11, 0x0, 0x40, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xe52c, 0x0, @perf_config_ext={0x0, 0x401}, 0x100, 0x4a86, 0x7, 0x7, 0x2, 0x753, 0x9}, r2, 0x1, 0xffffffffffffffff, 0xc) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080)=0xffff, 0xffffff43) r4 = gettid() r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r5, 0x0, 0x1e, &(0x7f0000000240)='{nodev+em0ppp0trustedbdeveth0\x00'}, 0x30) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r7, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x6, 0x2003}, 0x0, 0x0, &(0x7f0000000640)={0x2, 0x0, 0x1, 0x8}, &(0x7f0000000480)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={r6, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000580)='memory.events\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000240)='pids.events\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r2, r3, 0x0, 0x1b, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', r9}, 0x30) r10 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, r10, 0x0, 0xffffffffffffffff, 0x0) close(r11) r12 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000540)={0x5, 0x70, 0x8, 0x2, 0x81, 0x11, 0x0, 0x40, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xe52c, 0x0, @perf_config_ext={0x0, 0x401}, 0x100, 0x4a86, 0x7, 0x7, 0x2, 0x753, 0x9}, r13, 0x1, 0xffffffffffffffff, 0xc) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r14, &(0x7f0000000080)=0xffff, 0xffffff43) r15 = gettid() r16 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r15, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r16, 0x0, 0x1e, &(0x7f0000000240)='{nodev+em0ppp0trustedbdeveth0\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xfffffffffffffd64, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x6, 0x2003}, 0x0, 0x0, &(0x7f0000000640)={0x1, 0x0, 0x1, 0x8}, &(0x7f0000000480)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={r17, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000580)='memory.events\x00', r18}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000240)='pids.events\x00', r18}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r13, r14, 0x0, 0x1b, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', r19}, 0x30) r20 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x20, 0x8, 0x6, 0x3f, 0x0, 0x5, 0x2000, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x8, 0x9, 0x10000, 0x1, 0xf8, 0x7b8, 0x1}, r13, 0x2, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x81, 0x9, 0x1, 0xd4, 0x0, 0x3, 0x21026, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f1, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffe}, 0x100, 0x20, 0x8000, 0x0, 0xbc, 0x0, 0x35}, r12, 0x7, r20, 0x5) r21 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r21, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r21, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r21, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x800, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8000000000000, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) gettid() 05:53:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58020000}, 0x0) 05:53:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r4 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r2, 0x0, 0x0) 05:53:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xfeffffff) [ 2594.095709][T23929] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xff0f0000) 05:53:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xffffffeb) 05:53:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xfffffff6) 05:53:54 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xfffffffe) 05:53:54 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x1000000000000) [ 2595.227412][T23949] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2595.664019][T23931] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2595.976487][T24014] IPVS: ftp: loaded support on port[0] = 21 05:53:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x26e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58030000}, 0x0) [ 2596.076068][T23957] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2596.512138][T24019] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:53:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x296, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:53:55 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x100000000000000) 05:53:55 executing program 0: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x9}, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0xfffffffffffffee5) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)=0x1) close(r1) socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000200)=0xa7) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f0000000380), 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r7, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r7, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'dummy0\x00', 0x2}) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r6, &(0x7f00000000c0)=ANY=[@ANYBLOB="006386c607"], 0x90ad) ioctl$TUNGETFILTER(r6, 0x801054db, &(0x7f00000002c0)=""/132) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000100)=0x4) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 2597.304083][T24037] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2597.769474][T24014] chnl_net:caif_netlink_parms(): no params data found [ 2597.907896][T24021] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2598.251940][T24014] bridge0: port 1(bridge_slave_0) entered blocking state [ 2598.259070][T24014] bridge0: port 1(bridge_slave_0) entered disabled state [ 2598.282449][T24014] device bridge_slave_0 entered promiscuous mode [ 2598.364252][T24014] bridge0: port 2(bridge_slave_1) entered blocking state [ 2598.371927][T24014] bridge0: port 2(bridge_slave_1) entered disabled state [ 2598.381744][T24014] device bridge_slave_1 entered promiscuous mode [ 2598.469322][T24014] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2598.483766][T24014] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2598.563553][T24014] team0: Port device team_slave_0 added [ 2598.573311][T24014] team0: Port device team_slave_1 added [ 2598.684798][T24014] device hsr_slave_0 entered promiscuous mode [ 2598.771575][T24014] device hsr_slave_1 entered promiscuous mode [ 2598.860007][T24014] debugfs: Directory 'hsr0' with parent '/' already present! [ 2599.186404][T24014] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2599.209164][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2599.224237][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2599.233357][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2599.249049][T24014] 8021q: adding VLAN 0 to HW filter on device team0 [ 2599.356720][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2599.367148][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2599.376717][ T1375] bridge0: port 1(bridge_slave_0) entered blocking state [ 2599.383850][ T1375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2599.464106][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2599.473380][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2599.483713][T24866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2599.493699][T24866] bridge0: port 2(bridge_slave_1) entered blocking state [ 2599.500794][T24866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2599.564363][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2599.586009][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2599.612363][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2599.623166][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2599.633752][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2599.645072][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2599.726155][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2599.737575][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2599.747769][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2599.769225][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2599.780295][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2599.853772][T24014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2599.904931][T24014] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2600.270283][T24085] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2600.288883][T24085] CPU: 1 PID: 24085 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2600.296812][T24085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2600.306875][T24085] Call Trace: [ 2600.310177][T24085] dump_stack+0x172/0x1f0 [ 2600.314513][T24085] dump_header+0x10b/0x82d [ 2600.318933][T24085] oom_kill_process.cold+0x10/0x15 [ 2600.324043][T24085] out_of_memory+0x334/0x1340 [ 2600.328720][T24085] ? __sched_text_start+0x8/0x8 [ 2600.333576][T24085] ? oom_killer_disable+0x280/0x280 [ 2600.338786][T24085] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2600.344331][T24085] ? memcg_stat_show+0xc40/0xc40 [ 2600.349276][T24085] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2600.355095][T24085] ? cgroup_file_notify+0x140/0x1b0 [ 2600.360296][T24085] memory_max_write+0x262/0x3a0 [ 2600.365155][T24085] ? mem_cgroup_write+0x370/0x370 [ 2600.370181][T24085] ? lock_acquire+0x190/0x410 [ 2600.374871][T24085] ? kernfs_fop_write+0x227/0x480 [ 2600.379903][T24085] cgroup_file_write+0x241/0x790 [ 2600.384843][T24085] ? mem_cgroup_write+0x370/0x370 [ 2600.389876][T24085] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2600.395513][T24085] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2600.401151][T24085] kernfs_fop_write+0x2b8/0x480 [ 2600.405999][T24085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2600.412242][T24085] __vfs_write+0x8a/0x110 [ 2600.416571][T24085] ? kernfs_fop_open+0xd80/0xd80 [ 2600.421514][T24085] vfs_write+0x268/0x5d0 [ 2600.425760][T24085] ksys_write+0x14f/0x290 [ 2600.430095][T24085] ? __ia32_sys_read+0xb0/0xb0 [ 2600.434864][T24085] ? do_syscall_64+0x26/0x760 [ 2600.439537][T24085] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2600.445605][T24085] ? do_syscall_64+0x26/0x760 [ 2600.450292][T24085] __x64_sys_write+0x73/0xb0 [ 2600.454901][T24085] do_syscall_64+0xfa/0x760 [ 2600.459428][T24085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2600.465323][T24085] RIP: 0033:0x459a59 [ 2600.469219][T24085] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2600.488931][T24085] RSP: 002b:00007ff6e75f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2600.497350][T24085] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2600.505321][T24085] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000c [ 2600.513294][T24085] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2600.521264][T24085] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6e75f96d4 [ 2600.529233][T24085] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2600.569951][T24085] memory: usage 6744kB, limit 0kB, failcnt 555 [ 2600.576178][T24085] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2600.583829][T24085] Memory cgroup stats for /syz4: [ 2600.583943][T24085] anon 4296704 [ 2600.583943][T24085] file 49152 [ 2600.583943][T24085] kernel_stack 0 [ 2600.583943][T24085] slab 2285568 [ 2600.583943][T24085] sock 0 [ 2600.583943][T24085] shmem 221184 [ 2600.583943][T24085] file_mapped 0 [ 2600.583943][T24085] file_dirty 135168 [ 2600.583943][T24085] file_writeback 0 [ 2600.583943][T24085] anon_thp 4194304 [ 2600.583943][T24085] inactive_anon 135168 [ 2600.583943][T24085] active_anon 4296704 [ 2600.583943][T24085] inactive_file 16384 [ 2600.583943][T24085] active_file 12288 [ 2600.583943][T24085] unevictable 0 [ 2600.583943][T24085] slab_reclaimable 1486848 [ 2600.583943][T24085] slab_unreclaimable 798720 [ 2600.583943][T24085] pgfault 258687 [ 2600.583943][T24085] pgmajfault 0 [ 2600.583943][T24085] workingset_refault 0 [ 2600.583943][T24085] workingset_activate 0 [ 2600.583943][T24085] workingset_nodereclaim 0 [ 2600.583943][T24085] pgrefill 1643 [ 2600.583943][T24085] pgscan 7112 [ 2600.583943][T24085] pgsteal 3188 [ 2600.678095][T24085] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24084,uid=0 [ 2600.696766][T24085] Memory cgroup out of memory: Killed process 24084 (syz-executor.4) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 2600.719339][ T1071] oom_reaper: reaped process 24084 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 05:54:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:54:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58040000}, 0x0) 05:54:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x200000000000000) 05:54:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x25e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x297, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x27e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2600.802273][T24014] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2600.854731][T24014] CPU: 1 PID: 24014 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2600.862664][T24014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2600.864016][T24091] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2600.872720][T24014] Call Trace: [ 2600.872743][T24014] dump_stack+0x172/0x1f0 [ 2600.872764][T24014] dump_header+0x10b/0x82d [ 2600.872777][T24014] ? oom_kill_process+0x94/0x3f0 [ 2600.872792][T24014] oom_kill_process.cold+0x10/0x15 [ 2600.872808][T24014] out_of_memory+0x334/0x1340 [ 2600.872823][T24014] ? lock_downgrade+0x920/0x920 [ 2600.872842][T24014] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2600.872856][T24014] ? oom_killer_disable+0x280/0x280 [ 2600.872880][T24014] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2600.872895][T24014] ? memcg_stat_show+0xc40/0xc40 [ 2600.872913][T24014] ? do_raw_spin_unlock+0x57/0x270 [ 2600.872931][T24014] ? _raw_spin_unlock+0x2d/0x50 [ 2600.872948][T24014] try_charge+0xf4b/0x1440 [ 2600.872971][T24014] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2600.872991][T24014] ? percpu_ref_tryget_live+0x111/0x290 [ 2600.924754][T24014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2600.924771][T24014] ? __kasan_check_read+0x11/0x20 [ 2600.924792][T24014] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2600.924811][T24014] mem_cgroup_try_charge+0x136/0x590 [ 2600.924836][T24014] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2600.924855][T24014] wp_page_copy+0x407/0x1860 [ 2600.924872][T24014] ? find_held_lock+0x35/0x130 [ 2600.924887][T24014] ? do_wp_page+0x53b/0x15c0 [ 2600.924905][T24014] ? pmd_devmap_trans_unstable+0x220/0x220 [ 2600.955224][T24014] ? lock_downgrade+0x920/0x920 [ 2600.955244][T24014] ? swp_swapcount+0x540/0x540 [ 2600.955266][T24014] ? __kasan_check_read+0x11/0x20 [ 2600.972042][T24014] ? do_raw_spin_unlock+0x57/0x270 [ 2600.972064][T24014] do_wp_page+0x543/0x15c0 [ 2600.972086][T24014] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 2600.972111][T24014] __handle_mm_fault+0x23ec/0x4040 [ 2600.972130][T24014] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2601.002483][T24014] ? handle_mm_fault+0x292/0xaa0 05:54:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x300000000000000) [ 2601.002517][T24014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2601.013156][T24014] ? __kasan_check_read+0x11/0x20 [ 2601.013183][T24014] handle_mm_fault+0x3b7/0xaa0 [ 2601.013206][T24014] __do_page_fault+0x536/0xdd0 [ 2601.013231][T24014] do_page_fault+0x38/0x590 [ 2601.013258][T24014] page_fault+0x39/0x40 [ 2601.013270][T24014] RIP: 0033:0x430b36 [ 2601.013288][T24014] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 2601.032543][T24014] RSP: 002b:00007ffd25bc4080 EFLAGS: 00010206 [ 2601.032557][T24014] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 2601.032566][T24014] RDX: 000000000126d930 RSI: 0000000001275970 RDI: 0000000000000003 [ 2601.032575][T24014] RBP: 0000000000008041 R08: 0000000000000001 R09: 000000000126c940 [ 2601.032583][T24014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 2601.032592][T24014] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 05:54:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x400000000000000) [ 2601.250345][T24014] memory: usage 2364kB, limit 0kB, failcnt 563 [ 2601.263963][T24014] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2601.301126][T24014] Memory cgroup stats for /syz4: [ 2601.301233][T24014] anon 53248 [ 2601.301233][T24014] file 49152 [ 2601.301233][T24014] kernel_stack 0 [ 2601.301233][T24014] slab 2285568 [ 2601.301233][T24014] sock 0 [ 2601.301233][T24014] shmem 221184 [ 2601.301233][T24014] file_mapped 0 [ 2601.301233][T24014] file_dirty 135168 [ 2601.301233][T24014] file_writeback 0 [ 2601.301233][T24014] anon_thp 0 [ 2601.301233][T24014] inactive_anon 135168 [ 2601.301233][T24014] active_anon 53248 [ 2601.301233][T24014] inactive_file 16384 [ 2601.301233][T24014] active_file 12288 [ 2601.301233][T24014] unevictable 0 [ 2601.301233][T24014] slab_reclaimable 1486848 [ 2601.301233][T24014] slab_unreclaimable 798720 [ 2601.301233][T24014] pgfault 258687 [ 2601.301233][T24014] pgmajfault 0 [ 2601.301233][T24014] workingset_refault 0 [ 2601.301233][T24014] workingset_activate 0 [ 2601.301233][T24014] workingset_nodereclaim 0 [ 2601.301233][T24014] pgrefill 1643 [ 2601.301233][T24014] pgscan 7112 [ 2601.301233][T24014] pgsteal 3188 [ 2601.301233][T24014] pgactivate 2805 05:54:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x2700000000000000) [ 2601.405739][T24014] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24014,uid=0 [ 2601.448951][T24014] Memory cgroup out of memory: Killed process 24014 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 05:54:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x3f00000000000000) 05:54:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x4000000000000000) 05:54:01 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xebffffff00000000) 05:54:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) [ 2602.485142][T24096] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 05:54:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58070000}, 0x0) 05:54:01 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xf6ffffff00000000) [ 2602.914986][T24092] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:54:02 executing program 0: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2603.334037][T24102] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:54:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x298, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2603.670654][T24185] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:54:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x28e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xfeffffff00000000) 05:54:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58080000}, 0x0) 05:54:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:54:02 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x1, 0x10000, 0xfffffffc, 0x25, r0, 0xff, [], 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2b, 'io'}, {0x2d, 'pids'}]}, 0xa) 05:54:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xff0f000000000000) [ 2603.816270][T24201] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 05:54:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0xffffffff00000000) 05:54:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacc\xdb\xd2K\xdc{f\"\xde\xcd\xabO\xab\xf0`\x8dXt+usage_percMu2', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000000c0)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', @local}) openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) close(r4) 05:54:03 executing program 2: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x6) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2604.346811][T24201] device 0 entered promiscuous mode 05:54:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c000000}, 0x0) [ 2604.431657][T24208] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:54:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='\xe7\x00\x00\x00roup\x00', 0x200002, 0x0) [ 2605.026088][T24184] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2605.466306][T24263] IPVS: ftp: loaded support on port[0] = 21 [ 2605.475257][T24209] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:54:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) sendmsg$kcm(r2, &(0x7f0000000280)={&(0x7f00000000c0)=@in={0x2, 0x4e24, @remote}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="2197d41f457886707b638490c7823114115e0b684573c9f952d0951383c7b7dbbd1418265921aea1a13fdafd78736c3950a7340eb448e77971f840c34cd13928d4", 0x41}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000001c0)}, {&(0x7f0000000300)="00a1881270e27ba0d7753855d5b97e28109a134b513eff7b34577918498b4b8ad288eb1a7ed9dc147a061f73a2f253633d57902c953716cd5ad5ceb36a519978601793b29e212ae73cbbbcf5e1182975d68bd811fdf386a0d8ec85421840e393d4ec8164e087abfeeff7e5fde9889334bbbfbc2807f7e53c109bce2442435a4a4af6ec5178a4470a6443afb26614bdd9c85245610d55ea40b07978bb9146ca4566ba6dc0484c03695d49d59d68a2fc4a9dc7a801bf99b8db76a10e3061a4b782ee1daff109d58a32069d30a072a0", 0xce}], 0x4}, 0x20000000) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b0000000200"/15], 0x20}, 0x0) 05:54:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x29e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x299, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c060000}, 0x0) [ 2605.945480][T24272] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2606.989706][T24275] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2607.275952][T24263] chnl_net:caif_netlink_parms(): no params data found [ 2607.309945][T24276] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2607.641314][T24263] bridge0: port 1(bridge_slave_0) entered blocking state [ 2607.648392][T24263] bridge0: port 1(bridge_slave_0) entered disabled state [ 2607.663940][T24263] device bridge_slave_0 entered promiscuous mode [ 2607.687038][T24263] bridge0: port 2(bridge_slave_1) entered blocking state [ 2607.700057][T24263] bridge0: port 2(bridge_slave_1) entered disabled state [ 2607.720391][T24263] device bridge_slave_1 entered promiscuous mode [ 2607.809203][T24263] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2607.931265][T24263] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2607.961911][T24263] team0: Port device team_slave_0 added [ 2607.971823][T24263] team0: Port device team_slave_1 added [ 2608.074561][T24263] device hsr_slave_0 entered promiscuous mode [ 2608.121304][T24263] device hsr_slave_1 entered promiscuous mode [ 2608.160234][T24263] debugfs: Directory 'hsr0' with parent '/' already present! [ 2608.643523][T24263] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2608.666831][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2608.676286][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2608.702348][T24263] 8021q: adding VLAN 0 to HW filter on device team0 [ 2608.718145][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2608.728088][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2608.737751][T25921] bridge0: port 1(bridge_slave_0) entered blocking state [ 2608.744868][T25921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2608.803524][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2608.813042][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2608.823794][ T1375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2608.833901][ T1375] bridge0: port 2(bridge_slave_1) entered blocking state [ 2608.841033][ T1375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2608.910652][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2608.923927][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2609.006109][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2609.016910][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2609.043341][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2609.053828][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2609.064469][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2609.075330][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2609.085485][T10760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2609.210095][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2609.224962][T10764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2609.240617][T24263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2609.287291][T24263] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2609.539703][T24326] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2609.552994][T24326] CPU: 0 PID: 24326 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2609.561013][T24326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2609.571171][T24326] Call Trace: [ 2609.574484][T24326] dump_stack+0x172/0x1f0 [ 2609.578845][T24326] dump_header+0x10b/0x82d [ 2609.583291][T24326] oom_kill_process.cold+0x10/0x15 [ 2609.588434][T24326] out_of_memory+0x334/0x1340 [ 2609.593140][T24326] ? __sched_text_start+0x8/0x8 [ 2609.598011][T24326] ? oom_killer_disable+0x280/0x280 [ 2609.603344][T24326] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2609.608903][T24326] ? memcg_stat_show+0xc40/0xc40 [ 2609.613883][T24326] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2609.619709][T24326] ? cgroup_file_notify+0x140/0x1b0 [ 2609.624914][T24326] memory_max_write+0x262/0x3a0 [ 2609.629776][T24326] ? mem_cgroup_write+0x370/0x370 [ 2609.634801][T24326] ? lock_acquire+0x190/0x410 [ 2609.639475][T24326] ? kernfs_fop_write+0x227/0x480 [ 2609.644506][T24326] cgroup_file_write+0x241/0x790 [ 2609.649443][T24326] ? mem_cgroup_write+0x370/0x370 [ 2609.654592][T24326] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2609.660235][T24326] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2609.665871][T24326] kernfs_fop_write+0x2b8/0x480 [ 2609.670723][T24326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2609.677015][T24326] __vfs_write+0x8a/0x110 [ 2609.681342][T24326] ? kernfs_fop_open+0xd80/0xd80 [ 2609.686279][T24326] vfs_write+0x268/0x5d0 [ 2609.690524][T24326] ksys_write+0x14f/0x290 [ 2609.694856][T24326] ? __ia32_sys_read+0xb0/0xb0 [ 2609.699618][T24326] ? do_syscall_64+0x26/0x760 [ 2609.704291][T24326] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2609.710354][T24326] ? do_syscall_64+0x26/0x760 [ 2609.715034][T24326] __x64_sys_write+0x73/0xb0 [ 2609.719627][T24326] do_syscall_64+0xfa/0x760 [ 2609.724138][T24326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2609.730253][T24326] RIP: 0033:0x459a59 [ 2609.734160][T24326] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2609.753771][T24326] RSP: 002b:00007fcf2efefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2609.762224][T24326] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2609.770192][T24326] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000c [ 2609.778160][T24326] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2609.786127][T24326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf2eff06d4 [ 2609.794098][T24326] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2609.807786][T24326] memory: usage 6800kB, limit 0kB, failcnt 564 [ 2609.814871][T24326] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2609.822347][T24326] Memory cgroup stats for /syz4: [ 2609.822456][T24326] anon 4288512 [ 2609.822456][T24326] file 49152 [ 2609.822456][T24326] kernel_stack 65536 [ 2609.822456][T24326] slab 2420736 [ 2609.822456][T24326] sock 0 [ 2609.822456][T24326] shmem 221184 [ 2609.822456][T24326] file_mapped 0 [ 2609.822456][T24326] file_dirty 135168 [ 2609.822456][T24326] file_writeback 0 [ 2609.822456][T24326] anon_thp 4194304 [ 2609.822456][T24326] inactive_anon 135168 [ 2609.822456][T24326] active_anon 4288512 [ 2609.822456][T24326] inactive_file 16384 [ 2609.822456][T24326] active_file 12288 [ 2609.822456][T24326] unevictable 0 [ 2609.822456][T24326] slab_reclaimable 1486848 [ 2609.822456][T24326] slab_unreclaimable 933888 [ 2609.822456][T24326] pgfault 258753 [ 2609.822456][T24326] pgmajfault 0 [ 2609.822456][T24326] workingset_refault 0 [ 2609.822456][T24326] workingset_activate 0 [ 2609.822456][T24326] workingset_nodereclaim 0 [ 2609.822456][T24326] pgrefill 1643 [ 2609.822456][T24326] pgscan 7112 [ 2609.822456][T24326] pgsteal 3188 [ 2609.919392][T24326] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24325,uid=0 [ 2609.935343][T24326] Memory cgroup out of memory: Killed process 24325 (syz-executor.4) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 2609.958038][ T1071] oom_reaper: reaped process 24325 (syz-executor.4), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB 05:54:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:54:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.memory_migrate\x00', 0x2, 0x0) 05:54:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x40) recvmsg(r0, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x4, 0x0, 0x0, 0x0, r1, 0x1, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x4, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x17, 0xb, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@jmp={0x5, 0x0, 0x8, 0x3, 0xb, 0xfffffffffffffffe, 0x1}, @map={0x18, 0x4, 0x1, 0x0, r3}, @map={0x18, 0xf, 0x1, 0x0, r4}, @map_val={0x18, 0x11, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x8}, @generic={0x74, 0x6, 0x6, 0x80}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xa, 0xc0, 0xc503}, 0x10}, 0x70) recvmsg(r0, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000001340)=""/48, 0x30}, {&(0x7f0000001600)=""/199, 0xc7}, {&(0x7f0000000100)=""/39, 0x27}, {&(0x7f0000002780)=""/122, 0x7a}, {&(0x7f0000000380)=""/228, 0xe4}, {&(0x7f0000002980)=""/73, 0x49}, {&(0x7f0000002a00)=""/161, 0xa1}], 0x8}, 0x0) 05:54:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c0d0000}, 0x0) 05:54:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x2ae30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x29a, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2610.043334][T24263] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2610.090822][T24333] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2610.105319][T24334] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 2610.114547][T24263] CPU: 0 PID: 24263 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2610.122455][T24263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2610.122462][T24263] Call Trace: [ 2610.122483][T24263] dump_stack+0x172/0x1f0 [ 2610.122502][T24263] dump_header+0x10b/0x82d [ 2610.122524][T24263] ? oom_kill_process+0x94/0x3f0 [ 2610.149644][T24263] oom_kill_process.cold+0x10/0x15 [ 2610.154783][T24263] out_of_memory+0x334/0x1340 [ 2610.159467][T24263] ? lock_downgrade+0x920/0x920 [ 2610.164326][T24263] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2610.164345][T24263] ? oom_killer_disable+0x280/0x280 [ 2610.164370][T24263] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2610.164385][T24263] ? memcg_stat_show+0xc40/0xc40 [ 2610.164405][T24263] ? do_raw_spin_unlock+0x57/0x270 [ 2610.185870][T24263] ? _raw_spin_unlock+0x2d/0x50 [ 2610.185891][T24263] try_charge+0xf4b/0x1440 [ 2610.185914][T24263] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2610.206067][T24263] ? percpu_ref_tryget_live+0x111/0x290 [ 2610.211642][T24263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2610.218006][T24263] ? __kasan_check_read+0x11/0x20 [ 2610.218029][T24263] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2610.218049][T24263] mem_cgroup_try_charge+0x136/0x590 [ 2610.218073][T24263] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2610.218093][T24263] __handle_mm_fault+0x1f0d/0x4040 [ 2610.218115][T24263] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2610.218131][T24263] ? handle_mm_fault+0x292/0xaa0 [ 2610.218164][T24263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2610.250262][T24263] ? __kasan_check_read+0x11/0x20 [ 2610.250285][T24263] handle_mm_fault+0x3b7/0xaa0 [ 2610.250307][T24263] __do_page_fault+0x536/0xdd0 [ 2610.250329][T24263] do_page_fault+0x38/0x590 [ 2610.250349][T24263] page_fault+0x39/0x40 [ 2610.250360][T24263] RIP: 0033:0x403522 [ 2610.250381][T24263] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 2610.308229][T24263] RSP: 002b:00007ffc305f1e30 EFLAGS: 00010246 [ 2610.314305][T24263] RAX: 0000000000000000 RBX: 000000000027d15a RCX: 0000000000413660 [ 2610.322290][T24263] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffc305f2f60 [ 2610.330400][T24263] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001a9d940 05:54:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='\x00\x00\x00\x00\x80\x00\x00\x01\x00', 0x200002, 0x0) 05:54:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgrouz0\x00\xaeY\xd8(\xcf\x88\xa9e\t\xcf<\x9e\xe1\x12Q%rg\x0e\xfaHY\xd5\xde\x81\xbc\xabTk\xff\xf5\'N\x03\xcb\x92L\xc4\xfd\xc8\xc0\xf8=A\xbe\x9b!\b\x88.5.\xe6', 0x200002, 0x0) [ 2610.338391][T24263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc305f2f60 [ 2610.346379][T24263] R13: 00007ffc305f2f50 R14: 0000000000000000 R15: 00007ffc305f2f60 [ 2610.388315][T24263] memory: usage 2428kB, limit 0kB, failcnt 572 [ 2610.394991][T24263] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2610.409012][T24263] Memory cgroup stats for /syz4: [ 2610.409115][T24263] anon 28672 [ 2610.409115][T24263] file 49152 [ 2610.409115][T24263] kernel_stack 0 [ 2610.409115][T24263] slab 2420736 [ 2610.409115][T24263] sock 0 [ 2610.409115][T24263] shmem 221184 [ 2610.409115][T24263] file_mapped 0 [ 2610.409115][T24263] file_dirty 135168 [ 2610.409115][T24263] file_writeback 0 [ 2610.409115][T24263] anon_thp 0 [ 2610.409115][T24263] inactive_anon 135168 [ 2610.409115][T24263] active_anon 28672 [ 2610.409115][T24263] inactive_file 16384 [ 2610.409115][T24263] active_file 12288 [ 2610.409115][T24263] unevictable 0 [ 2610.409115][T24263] slab_reclaimable 1486848 [ 2610.409115][T24263] slab_unreclaimable 933888 [ 2610.409115][T24263] pgfault 258753 [ 2610.409115][T24263] pgmajfault 0 [ 2610.409115][T24263] workingset_refault 0 [ 2610.409115][T24263] workingset_activate 0 05:54:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2d, 'memory'}, {0x2b, 'cpu'}, {0x2d, 'io'}, {0x2b, 'pids'}, {0x2d, 'io'}, {0x2d, 'memory'}, {0x2b, 'rdma'}]}, 0x29) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) recvmsg$kcm(r1, &(0x7f0000003880)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000002c0)=""/193, 0xc1}, {&(0x7f0000000140)=""/16, 0x10}, {&(0x7f00000001c0)=""/20, 0x14}, {&(0x7f00000003c0)=""/230, 0xe6}, {&(0x7f00000004c0)=""/248, 0xf8}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/4096, 0x1000}, {&(0x7f00000035c0)=""/231, 0xe7}], 0x9, &(0x7f0000003780)=""/248, 0xf8}, 0x40010123) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_int(r2, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) [ 2610.409115][T24263] workingset_nodereclaim 0 [ 2610.409115][T24263] pgrefill 1643 [ 2610.409115][T24263] pgscan 7112 [ 2610.409115][T24263] pgsteal 3188 [ 2610.409115][T24263] pgactivate 2805 [ 2610.519178][T24263] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24263,uid=0 [ 2610.535011][T24263] Memory cgroup out of memory: Killed process 24263 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 2610.554698][ T1071] oom_reaper: reaped process 24263 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 05:54:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x80, 0x8, 0x9, 0x8, 0x0, 0xe3df, 0x200, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x6, @perf_config_ext={0x7fff, 0x6}, 0xd8c8, 0x3a1, 0x8, 0x4, 0x1, 0x10000, 0xa3d8}, r2, 0xe, 0xffffffffffffffff, 0xe) r3 = openat$cgroup_ro(r0, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbci<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85AJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f8\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF\x84ey\xcdJ)x\xea\xe4v\x14\xbf\x17\x92\xd2>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xce\x00'/680) close(r1) 05:54:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x1) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') recvmsg$kcm(r2, &(0x7f0000010300)={&(0x7f000000ff40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000010240)=[{&(0x7f000000ffc0)=""/7, 0x7}, {&(0x7f0000010000)=""/7, 0x7}, {&(0x7f0000010040)=""/118, 0x76}, {&(0x7f00000100c0)=""/44, 0x2c}, {&(0x7f0000010100)=""/92, 0x5c}, {&(0x7f0000010180)=""/190, 0xbe}], 0x6, &(0x7f00000102c0)}, 0x100) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000010480)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000007000000070000000000000e01000000000000000300000000000009030000000e00000000000008000000000a0000000000000b050067bb0000002e2e5f608f00"], &(0x7f00000103c0)=""/167, 0x53, 0xa7, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000104c0)={0xb, 0x2, 0x8, 0x6, 0x31, r1, 0x2000, [], r3, r4, 0x3}, 0x3c) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) [ 2610.887222][T24383] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 2611.210610][T24334] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 05:54:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60010000}, 0x0) [ 2611.626060][T24383] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 05:54:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:54:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000200)='cpuacct.usage_perc\xb4\xacM\xafys\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x10001) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x319, &(0x7f00000000c0)=[{&(0x7f0000000100)="250000001a008100a00f80ecdb4cb904024865160b000000d4126efb09000300ac14142240", 0x25}], 0x1}, 0x4000) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r6, 0x14}, 0x10) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000040)) 05:54:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) [ 2611.702995][T24335] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2611.787178][T24415] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 05:54:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60020000}, 0x0) [ 2611.839249][T24420] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 05:54:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x2be30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2612.262817][T24348] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2612.680807][T24432] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:54:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x29b, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) 05:54:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = openat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080), 0x4) socketpair(0x3, 0x6, 0x2, &(0x7f00000002c0)) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x5e, 0x4, 0xe1, 0x3, 0x0, 0x0, 0x800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xff}, 0x41, 0x0, 0x47f, 0x9, 0x8, 0xffff, 0xfffa}, r3, 0xa, 0xffffffffffffffff, 0x1f) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r4, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000600)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000440), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='\"\xc3\xa0\x198puset.effective_m\xf5\xb2D\xd5\xe1\x15iM\a\xa6\x9d\x9c\x1a\xaaN\x98\xd02\x15B\x1fC\xbb\xe7\xee?\x8aQ\xe2>4\x04\x90\xfd\x7f\x01T\xb0e\xd7\xdfG\x11\xd0\xb4l\v\x8e\rx\xb4\xba\xd3\x9c\xea\xd2\xb5B%\xf3\xf8&\xbdhV\xe4\x02\x1e\xd4!\xaa\xdcTv\x94|\xecW?\xd3\xcf\xbd\xcd\xddq\xd2\x8d\f\x8e\xfdP\x0e\xfd\xc2\x82kg[\xa8\x1a\xe2\x9b\xb9\xe0J\xd6\x15\xb1\x85z\xfe7\xac\xf6\xf1\x8e\x11`\x02\x95+\xf4\xa8\t\xb6\xb5\x8d\xf2(g\x187$ J\xfa_\x13\xedZ\x04\n\xdf 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2619.216793][T24591] RSP: 002b:00007ff0a5108c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2619.225209][T24591] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2619.233179][T24591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 2619.241151][T24591] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2619.249122][T24591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff0a51096d4 [ 2619.257096][T24591] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2619.278566][T24591] memory: usage 6772kB, limit 0kB, failcnt 573 [ 2619.287547][T24591] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2619.295163][T24591] Memory cgroup stats for /syz4: [ 2619.295886][T24591] anon 4292608 [ 2619.295886][T24591] file 49152 [ 2619.295886][T24591] kernel_stack 65536 [ 2619.295886][T24591] slab 2420736 [ 2619.295886][T24591] sock 0 [ 2619.295886][T24591] shmem 221184 [ 2619.295886][T24591] file_mapped 0 [ 2619.295886][T24591] file_dirty 135168 [ 2619.295886][T24591] file_writeback 0 [ 2619.295886][T24591] anon_thp 4194304 [ 2619.295886][T24591] inactive_anon 135168 [ 2619.295886][T24591] active_anon 4292608 [ 2619.295886][T24591] inactive_file 16384 [ 2619.295886][T24591] active_file 12288 [ 2619.295886][T24591] unevictable 0 [ 2619.295886][T24591] slab_reclaimable 1486848 [ 2619.295886][T24591] slab_unreclaimable 933888 [ 2619.295886][T24591] pgfault 258852 [ 2619.295886][T24591] pgmajfault 0 [ 2619.295886][T24591] workingset_refault 0 [ 2619.295886][T24591] workingset_activate 0 [ 2619.295886][T24591] workingset_nodereclaim 0 [ 2619.295886][T24591] pgrefill 1643 [ 2619.295886][T24591] pgscan 7112 [ 2619.295886][T24591] pgsteal 3188 [ 2619.392751][T24591] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24589,uid=0 [ 2619.409379][T24591] Memory cgroup out of memory: Killed process 24589 (syz-executor.4) total-vm:72580kB, anon-rss:4228kB, file-rss:35844kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 2619.432833][ T1071] oom_reaper: reaped process 24589 (syz-executor.4), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB 05:54:18 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:54:18 executing program 0: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r1, &(0x7f0000001c00)={&(0x7f0000000980)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x20040010) socketpair$tipc(0x1e, 0x674d0372235cf010, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r2}, 0x3c) 05:54:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@var={0x4, 0x0, 0x0, 0xe, 0x1}, @fwd={0xc}, @const={0x2, 0x0, 0x0, 0xa, 0xbd47}, @var={0x10, 0x0, 0x0, 0xe, 0x2, 0x1}, @fwd={0x10}]}, {0x0, [0x12, 0x0, 0x5f]}}, &(0x7f0000000080)=""/84, 0x61, 0x54}, 0x20) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:54:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64000000}, 0x0) 05:54:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x2de30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x29d, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2619.588191][T24528] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2619.608820][T24602] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2619.618737][T24528] CPU: 0 PID: 24528 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2619.626641][T24528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2619.636721][T24528] Call Trace: [ 2619.640025][T24528] dump_stack+0x172/0x1f0 [ 2619.644361][T24528] dump_header+0x10b/0x82d [ 2619.648779][T24528] ? oom_kill_process+0x94/0x3f0 [ 2619.653724][T24528] oom_kill_process.cold+0x10/0x15 [ 2619.658841][T24528] out_of_memory+0x334/0x1340 [ 2619.663523][T24528] ? lock_downgrade+0x920/0x920 [ 2619.668386][T24528] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2619.674198][T24528] ? oom_killer_disable+0x280/0x280 [ 2619.679415][T24528] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2619.684969][T24528] ? memcg_stat_show+0xc40/0xc40 [ 2619.689916][T24528] ? do_raw_spin_unlock+0x57/0x270 [ 2619.695032][T24528] ? _raw_spin_unlock+0x2d/0x50 [ 2619.699892][T24528] try_charge+0xf4b/0x1440 [ 2619.704320][T24528] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2619.709864][T24528] ? percpu_ref_tryget_live+0x111/0x290 [ 2619.715417][T24528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.721664][T24528] ? __kasan_check_read+0x11/0x20 [ 2619.726809][T24528] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2619.732533][T24528] mem_cgroup_try_charge+0x136/0x590 05:54:18 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 05:54:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64070000}, 0x0) [ 2619.732557][T24528] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2619.732577][T24528] __handle_mm_fault+0x1f0d/0x4040 [ 2619.732598][T24528] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2619.732613][T24528] ? handle_mm_fault+0x292/0xaa0 [ 2619.732650][T24528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.743544][T24528] ? __kasan_check_read+0x11/0x20 [ 2619.743566][T24528] handle_mm_fault+0x3b7/0xaa0 [ 2619.743589][T24528] __do_page_fault+0x536/0xdd0 [ 2619.743613][T24528] do_page_fault+0x38/0x590 [ 2619.743639][T24528] page_fault+0x39/0x40 [ 2619.754255][T24528] RIP: 0033:0x42ffac [ 2619.754270][T24528] Code: 83 c0 17 41 55 41 54 55 53 48 89 c5 48 83 e5 f0 48 89 fb 48 81 ec 98 00 00 00 48 83 f8 20 b8 20 00 00 00 48 0f 42 e8 48 85 ff <48> 89 74 24 08 0f 84 3a 08 00 00 48 3b 2d ba 4f 64 00 77 70 89 ef [ 2619.754276][T24528] RSP: 002b:00007ffc99953fb0 EFLAGS: 00010202 [ 2619.754287][T24528] RAX: 0000000000000020 RBX: 0000000000716640 RCX: 0000000000458dc4 [ 2619.754295][T24528] RDX: 00007ffc999540a0 RSI: 0000000000008030 RDI: 0000000000716640 [ 2619.754302][T24528] RBP: 0000000000008040 R08: 0000000000000001 R09: 0000000002652940 [ 2619.754311][T24528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc99955280 [ 2619.754319][T24528] R13: 00007ffc99955270 R14: 0000000000000000 R15: 00007ffc99955280 [ 2619.879805][T24528] memory: usage 2384kB, limit 0kB, failcnt 581 [ 2619.894716][T24528] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2619.926241][T24528] Memory cgroup stats for /syz4: [ 2619.926347][T24528] anon 32768 [ 2619.926347][T24528] file 49152 [ 2619.926347][T24528] kernel_stack 65536 [ 2619.926347][T24528] slab 2420736 [ 2619.926347][T24528] sock 0 [ 2619.926347][T24528] shmem 221184 [ 2619.926347][T24528] file_mapped 0 [ 2619.926347][T24528] file_dirty 135168 [ 2619.926347][T24528] file_writeback 0 [ 2619.926347][T24528] anon_thp 0 [ 2619.926347][T24528] inactive_anon 135168 [ 2619.926347][T24528] active_anon 32768 [ 2619.926347][T24528] inactive_file 16384 [ 2619.926347][T24528] active_file 12288 [ 2619.926347][T24528] unevictable 0 [ 2619.926347][T24528] slab_reclaimable 1486848 [ 2619.926347][T24528] slab_unreclaimable 933888 [ 2619.926347][T24528] pgfault 258852 [ 2619.926347][T24528] pgmajfault 0 [ 2619.926347][T24528] workingset_refault 0 [ 2619.926347][T24528] workingset_activate 0 [ 2619.926347][T24528] workingset_nodereclaim 0 [ 2619.926347][T24528] pgrefill 1643 [ 2619.926347][T24528] pgscan 7112 [ 2619.926347][T24528] pgsteal 3188 [ 2619.947934][T24528] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24528,uid=0 05:54:19 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:54:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'nr0\x00', 0x100}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgrU\x1by\x95oup.net/syz\x00\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="e9cf5b4449eef288158116a1090000000000ac715f631c92d76eb24c0041000010000000000000000000000000000000f6ffffffffffffff0001000000000100000000"]) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r3, 0x1, 0x1}, 0x10) [ 2620.379987][T24528] Memory cgroup out of memory: Killed process 24528 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 2620.410987][ T1071] oom_reaper: reaped process 24528 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 2620.575785][T24632] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2620.602467][T24632] CPU: 1 PID: 24632 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 2620.610402][T24632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.620465][T24632] Call Trace: [ 2620.623772][T24632] dump_stack+0x172/0x1f0 [ 2620.628122][T24632] dump_header+0x10b/0x82d [ 2620.632552][T24632] oom_kill_process.cold+0x10/0x15 [ 2620.637692][T24632] out_of_memory+0x334/0x1340 [ 2620.642469][T24632] ? __sched_text_start+0x8/0x8 [ 2620.647330][T24632] ? oom_killer_disable+0x280/0x280 [ 2620.652543][T24632] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2620.658094][T24632] ? memcg_stat_show+0xc40/0xc40 [ 2620.663041][T24632] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2620.668854][T24632] ? cgroup_file_notify+0x140/0x1b0 [ 2620.674062][T24632] memory_max_write+0x262/0x3a0 [ 2620.678923][T24632] ? mem_cgroup_write+0x370/0x370 [ 2620.683978][T24632] ? mem_cgroup_write+0x370/0x370 [ 2620.689010][T24632] ? cgroup_file_write+0x1e2/0x790 [ 2620.694136][T24632] cgroup_file_write+0x241/0x790 [ 2620.699082][T24632] ? mem_cgroup_write+0x370/0x370 [ 2620.704113][T24632] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2620.709757][T24632] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2620.715405][T24632] kernfs_fop_write+0x2b8/0x480 [ 2620.720262][T24632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.726510][T24632] __vfs_write+0x8a/0x110 [ 2620.730846][T24632] ? kernfs_fop_open+0xd80/0xd80 [ 2620.735788][T24632] vfs_write+0x268/0x5d0 [ 2620.740040][T24632] ksys_write+0x14f/0x290 [ 2620.744377][T24632] ? __ia32_sys_read+0xb0/0xb0 [ 2620.749148][T24632] ? do_syscall_64+0x26/0x760 [ 2620.753826][T24632] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2620.759893][T24632] ? do_syscall_64+0x26/0x760 [ 2620.764578][T24632] __x64_sys_write+0x73/0xb0 [ 2620.769180][T24632] do_syscall_64+0xfa/0x760 [ 2620.773697][T24632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2620.779586][T24632] RIP: 0033:0x459a59 [ 2620.783481][T24632] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2620.803088][T24632] RSP: 002b:00007fb0ded10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2620.811518][T24632] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2620.819493][T24632] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 2620.827464][T24632] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2620.835438][T24632] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb0ded116d4 [ 2620.843411][T24632] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2620.859737][T24632] memory: usage 9328kB, limit 0kB, failcnt 68 [ 2620.871056][T24632] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2620.889942][T24632] Memory cgroup stats for /syz0: [ 2620.890073][T24632] anon 4452352 [ 2620.890073][T24632] file 151552 [ 2620.890073][T24632] kernel_stack 65536 [ 2620.890073][T24632] slab 4890624 [ 2620.890073][T24632] sock 0 [ 2620.890073][T24632] shmem 0 [ 2620.890073][T24632] file_mapped 0 [ 2620.890073][T24632] file_dirty 135168 [ 2620.890073][T24632] file_writeback 0 [ 2620.890073][T24632] anon_thp 4194304 [ 2620.890073][T24632] inactive_anon 0 [ 2620.890073][T24632] active_anon 4370432 [ 2620.890073][T24632] inactive_file 49152 [ 2620.890073][T24632] active_file 0 [ 2620.890073][T24632] unevictable 0 [ 2620.890073][T24632] slab_reclaimable 3379200 [ 2620.890073][T24632] slab_unreclaimable 1511424 [ 2620.890073][T24632] pgfault 192093 [ 2620.890073][T24632] pgmajfault 0 [ 2620.890073][T24632] workingset_refault 0 [ 2620.890073][T24632] workingset_activate 0 [ 2620.890073][T24632] workingset_nodereclaim 0 [ 2620.890073][T24632] pgrefill 35 [ 2620.890073][T24632] pgscan 365 [ 2620.890073][T24632] pgsteal 246 [ 2620.890073][T24632] pgactivate 66 [ 2621.016858][T24632] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24630,uid=0 [ 2621.036373][T24632] Memory cgroup out of memory: Killed process 24630 (syz-executor.0) total-vm:72576kB, anon-rss:4240kB, file-rss:35844kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 2621.058803][ T1071] oom_reaper: reaped process 24630 (syz-executor.0), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB 05:54:20 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xf, 0x0, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x40, &(0x7f0000000140)=""/64, 0x41f00, 0x0, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, &(0x7f0000000200)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x3ff}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x52bea8667efb538c) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x126, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x1}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(r2, &(0x7f0000001280)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000000800)=""/10, 0xa}, {&(0x7f0000000f00)=""/111, 0x6f}, {&(0x7f0000000f80)=""/138, 0x8a}, {&(0x7f0000001040)=""/116, 0x74}, {&(0x7f00000010c0)=""/117, 0x75}, {&(0x7f0000001140)=""/91, 0x5b}], 0x7, &(0x7f0000001240)=""/43, 0x2b}, 0x12001) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000502d25a80648c63940d0300fc00100003400a000000053582c137153e370900018004001700d1bd", 0x2e}], 0x1}, 0x0) sendmsg$sock(r3, &(0x7f00000007c0)={&(0x7f0000000840)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4, 0x0, {0xa, 0x4e21, 0x0, @mcast1, 0x5}}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b40)="d1cc6eae1fb791f039af5cc3a195b8fdee700ff730acf357cf8f324c4cea2a1698130e5a21c3b75e5933d8911a70ea46f0feb22e1b3031bbd0912ffb6160f248ba851d0a3eb3fcad5662f0cfb9201a4160dc4e0a5b5c3673f9b7641f09847d192db34516b0e18ca6ab2687b5d1edf9cd7c847e84ddb0c919700e7bba454f187d7ee777498637808a791a8c93ff138f4cf650e597a0c1fcd78a6aaff41e1ac27f2ef36602087d682ef236f1589fc310d96e7438a6a97e5f61fe15d425d8051fbfa6956821252003d474eb2140748764fdcc3509904987e92ff5b6a3e2a83c976f6327e0a27b9949d5f943", 0xea}, {&(0x7f00000008c0)="c88f2c9ebe4ba2b47ae68ba82e6d136eb564e95f8f1cb0e20cf5f2772d952f8ca88b9969e251a861628864873b973fbbfe882639c971e98b15cfdc26eecbe882edb100ba502d663bc4dd20a04fa7eec9fc28d0598b65ee", 0x57}, {&(0x7f0000000c40)="9954a6faee42035b4305868237eaa924f6669d3c104732b7f1097314d809c83bbb5bc664b4b422aba6fdd44bb82d7bb4cd2f242ac004d943493616c8ff9177399b879ed792bde85441ae06698e3d501b4f198c1e5685f69c4c61dac45b896a658de2fd7351519e4a6a32b5f8ce0558d0ac1bb8e87b42ad3c97f4b11d227b851195584724369aa3e1e57e454624c2a1d0c45c961826737b8652fc5c9a615c872835600aa85290dd7ca283a1e23ad96c604dadb11bc1ba647d5dd67407cdc9f817e8d79db62ea175233b2cbd6a3e2da43f686f21513f0e6be341aa48f89aa6b1179a11687c628f58c828ce", 0xea}, {&(0x7f0000000440)="a513d7cb24e37636cf38ed3ae588539962520a685fda7407fba68f97321e91686134", 0x22}, {&(0x7f0000000d40)="8c3c107fee2c0f7334a2ef7c9a5da6c360dda5002fa661186a4484fc200b4a8d13b09ede3944b90b2f6d7ce5da0e0107b64430ef203447e844e42fc233092db79a38f3af310ec7cc11a7423afe72b10a5bd876a038fc29b0e41fb8bfdd5f44461d7dd5cfb8771d77cba8b092ff7bd2a26eba683b7bb81b7235fad3459e82a3d3026986b32160cdf68fcd5c432c4adee82a183a02c77ca2e1f43a23595eb29f10ffc66c535c", 0xa5}], 0x5, &(0x7f0000000e80)=[@mark={{0x14, 0x1, 0x24, 0x487}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0xa05b}}, @mark={{0x14, 0x1, 0x24, 0x7fff}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x78}, 0x40) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') sendmsg$kcm(r5, &(0x7f0000003bc0)={&(0x7f00000012c0)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000001340)="a6eed9addbbea539987a87d181f308e55be900c3039805f39bb7c0092d2280b0561ab462e58844d8213ec4d1d75b7c7f93eadb902684f3f401febc7979e306cf0501e882ef3afb48c58f60ad89def8988b68c02e097af22f4914cef2b2a06432d67794dfd7b8572914da133fa6942cfe4d8e686b62c314faafda22ff072e0dc5aeddbbf1f9d60452bcdda3318f249def696cb51340f2f20c342dfe2ef7d4b17d4500bcca4ddb1edbe00d34c0f9a2de1a1ca881828ef3d3334af9c94d8338ed1203b5b5b8a5041fa4b6c7794e9f348bff69a4183bb7b3323c120086a4f900afb1f99fb6", 0xe3}, {&(0x7f0000001440)="4121d37adf2680a3297884a73d3198b0eaa0fe814fb34bca40bda222ee4f4ade4c7b966dbe0856b32c8f4d04ddc204396dc3767aca88a91511fdf0e54565d8345fcb26118596a6881cc0ab031de448eb3864aef447accfaad25a573c332a9c0159e321901e33ab7541526e679ff24efbfd470bdbe164745fee40484758ea8e4e516888a33bfaba777d8829d84245eb8f2fa431975a1eb7", 0x97}, {&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000002500)}, {&(0x7f0000002540)="46ddb77e361c8f421ed3eb5d305c6327db930e9f2d59812008711fcd49a5542c04d37233f9c17f96405fd86528d4f33601b6b535be93bc38", 0x38}, {&(0x7f0000002580)="6d510dbe", 0x4}, {&(0x7f00000025c0)="baf06065f78059c82c66e4066de0b67cc0128013c10cf3642157b58e84194f94353fdf78a98f90aa53eac2a9e8436efabd4ecdb153b95054cd7b8545dc918e9fd221d4e67edd01edbc6e6b55b86a74e563c12f6146be9c98b5a0f3a1fde145649d1278502f6c83df1119ef23dcc45fb7f30a3cec0e287a88226a385b5e4b3a88a21b4a550ea70f4fca3f6eef470c427ff30c6398bc222ab230dd1a50050236062a65694312835361a7bf07a076cc21be2cf28282d198e5b866bfb34bf477a680decaf5b500363665e897b244766fcbd083d225d5de88cc572bbe0074fc574b", 0xdf}], 0x7, &(0x7f0000002740)=[{0x110, 0x119, 0xf0, "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"}, {0xe0, 0x80, 0x6, "4c91e937944ae4d8953221db0c8b993d1cb0468de4f356fed5968e5a58336d11c4d93949928361ded4c9622d844534a281f389b92c31b78939006655255d4c93e37f5b47ed6644fc55338bcc0e8afbf0a74b84b0e4e0d6a851b4a9b1e906fc59adc6b799ccd0e507c0d10609e35697d1d9e5c766333f4db1f2a34d6d42d2ff55f9da10b2ac93e989651e1c56a8cdb05551e411372e3bff3ac48b31edf27c32300adc7af75f5ddd424ae10576a3069e5c98752e8379245d8b8063abb38db47969450c2481711a25695175c40f"}, {0x70, 0x112, 0xff, "995f01710e28be46aec8c3ca3c3606cd08f89598f44bac052a53cf2bb43b16aba4d1f023a8689ed1631fb5b1d184244ec25f2157c6b67bb5d3ed07b5595277d65b1703bac1c5f258f167a4be3465d120f38b96c491be1c05c30950a915630634"}, {0xf8, 0xa9b121f9a8f77e62, 0x4, "05ec389a7c6fde75791cae7f2a881e3943bbe1969361b6fb23193901a27384fffcc21e94e3ffd583bbf8b152b9be125d432b6e92daaa37775328a72ef76c36640f1d4bf49627bf399a086cd95c14c3a38575ef5a959bec4779344c27e6ccc63a58a1ce20273ebf3de5ded8eb28fca86a2275bd4950d46b93e10efc7db51ff2f1101896ed17e1b219918bf8c5f4df692335baa0ccdc188de66c05967e8acf40ff3aef02323dcd0128d6c2ad54e4149a81d55cac0154a29aad7ae178cb7a43580f257f8c180f99c20ce671bb09f8044b6a39285d48e3657548890fa2d99706905a19"}, {0x10, 0x10d, 0x8}, {0x80, 0x1, 0xff, "91a65679808de27b0cccb4a43f6804275e59ee253fa3528f6edbed4554a850e233496fe9fa1013bfb384289476c8b53dc386bc5655b2e90169f352c0f32a725a2db72809762cf307a5e0a509425b3dd8bcbc87cb282181256295c7a785f5fc7de496e69b5058b75bb009ca72458e2167"}, {0x60, 0x29, 0xffff, "1fd4d1f0a944e23885b2e095743b077c7d1a56de4fe978dfd6627d8525315dca8990654ef4eb91e0f1a0049215b71e4305ebf86e36b31d5ae7639c076e3a392ac6bd6ebbf4a408f2b8"}, {0x1010, 0x105, 0x8, "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"}], 0x1458}, 0x4000004) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') sendmsg$kcm(r4, &(0x7f0000000480)={&(0x7f0000000280)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ecb-serpent-avx,streebog256)\x00'}, 0x80, &(0x7f0000000400)=[{&(0x7f00000006c0)="a40c2cc21e5c5f8c75f75cec5abbe334a7e273f5f5b32bedda593f68b4351bd23bd5ddeb8b979398755e0039dd7311e6e70e9e13b6e6e238add0f06e0f2d000841a3b1fac2e87aa7839a30af22de8ecf0b890fc8218c6570b6e37b34ce0b25592c6f06692f6279879239d7be52c5797e233a8761dd5325e9f838108cfd592a8495d3573f48559b7940ce563a72f058009ecb7a1da3099d31d91c1db2156c219bbfbf1df5cd21f127270acec6dce4fcf021d89932cf97f8806b80784f84130e253e5c2f2534a90af57a31c71a692faf4c02358d65", 0xd4}], 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1f0}, 0x2100) recvmsg(0xffffffffffffffff, &(0x7f0000003dc0)={0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000003c00)=""/221, 0xdd}], 0x1, &(0x7f0000003d00)=""/173, 0xad}, 0x1040) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'ifb0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x8, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4420}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x8, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 2621.202101][T22738] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2621.230130][T22738] CPU: 0 PID: 22738 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 2621.238066][T22738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2621.248117][T22738] Call Trace: [ 2621.251416][T22738] dump_stack+0x172/0x1f0 [ 2621.255752][T22738] dump_header+0x10b/0x82d [ 2621.260163][T22738] ? oom_kill_process+0x94/0x3f0 [ 2621.265103][T22738] oom_kill_process.cold+0x10/0x15 [ 2621.270214][T22738] out_of_memory+0x334/0x1340 [ 2621.274890][T22738] ? lock_downgrade+0x920/0x920 [ 2621.279742][T22738] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2621.285551][T22738] ? oom_killer_disable+0x280/0x280 [ 2621.290766][T22738] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2621.296316][T22738] ? memcg_stat_show+0xc40/0xc40 [ 2621.301259][T22738] ? do_raw_spin_unlock+0x57/0x270 [ 2621.306372][T22738] ? _raw_spin_unlock+0x2d/0x50 [ 2621.311225][T22738] try_charge+0xf4b/0x1440 [ 2621.315637][T22738] ? find_held_lock+0x35/0x130 [ 2621.320420][T22738] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2621.325960][T22738] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2621.331507][T22738] ? find_held_lock+0x35/0x130 [ 2621.336300][T22738] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2621.341863][T22738] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2621.347418][T22738] ? memcg_kmem_put_cache+0x50/0x50 [ 2621.352621][T22738] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2621.358172][T22738] __memcg_kmem_charge+0x13a/0x3a0 [ 2621.363286][T22738] __alloc_pages_nodemask+0x4f5/0x900 [ 2621.368655][T22738] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2621.374204][T22738] ? __alloc_pages_slowpath+0x2910/0x2910 [ 2621.379922][T22738] ? percpu_ref_put_many+0xb6/0x190 [ 2621.385120][T22738] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2621.390401][T22738] ? trace_hardirqs_on+0x67/0x240 [ 2621.395418][T22738] ? __kasan_check_read+0x11/0x20 [ 2621.400443][T22738] copy_process+0x3f8/0x6860 [ 2621.405035][T22738] ? __kasan_check_read+0x11/0x20 [ 2621.410060][T22738] ? __lock_acquire+0x16f2/0x4a00 [ 2621.415077][T22738] ? __kasan_check_read+0x11/0x20 [ 2621.420095][T22738] ? mark_lock+0xc2/0x1220 [ 2621.424523][T22738] ? __cleanup_sighand+0x60/0x60 [ 2621.429458][T22738] ? find_held_lock+0x35/0x130 [ 2621.434232][T22738] _do_fork+0x146/0xfa0 [ 2621.438390][T22738] ? copy_init_mm+0x20/0x20 [ 2621.442893][T22738] ? __kasan_check_read+0x11/0x20 [ 2621.447913][T22738] ? _copy_to_user+0x118/0x160 [ 2621.452679][T22738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2621.458913][T22738] ? put_timespec64+0xda/0x140 [ 2621.463679][T22738] __x64_sys_clone+0x18d/0x250 [ 2621.468443][T22738] ? __ia32_sys_vfork+0xc0/0xc0 [ 2621.473304][T22738] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2621.478594][T22738] ? trace_hardirqs_on+0x67/0x240 [ 2621.483625][T22738] do_syscall_64+0xfa/0x760 [ 2621.488136][T22738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2621.494018][T22738] RIP: 0033:0x45802a [ 2621.497907][T22738] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2621.517498][T22738] RSP: 002b:00007ffdff1e1420 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2621.525897][T22738] RAX: ffffffffffffffda RBX: 00007ffdff1e1420 RCX: 000000000045802a [ 2621.533850][T22738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2621.541808][T22738] RBP: 00007ffdff1e1460 R08: 0000000000000001 R09: 000000000277b940 [ 2621.549775][T22738] R10: 000000000277bc10 R11: 0000000000000246 R12: 0000000000000001 [ 2621.557731][T22738] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffdff1e14b0 [ 2621.568972][T22738] memory: usage 4940kB, limit 0kB, failcnt 80 [ 2621.577022][T22738] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2621.584654][T22738] Memory cgroup stats for /syz0: [ 2621.584763][T22738] anon 65536 [ 2621.584763][T22738] file 151552 [ 2621.584763][T22738] kernel_stack 65536 [ 2621.584763][T22738] slab 4890624 [ 2621.584763][T22738] sock 0 [ 2621.584763][T22738] shmem 0 [ 2621.584763][T22738] file_mapped 0 [ 2621.584763][T22738] file_dirty 135168 [ 2621.584763][T22738] file_writeback 0 [ 2621.584763][T22738] anon_thp 0 [ 2621.584763][T22738] inactive_anon 0 [ 2621.584763][T22738] active_anon 65536 [ 2621.584763][T22738] inactive_file 49152 [ 2621.584763][T22738] active_file 0 [ 2621.584763][T22738] unevictable 0 [ 2621.584763][T22738] slab_reclaimable 3379200 [ 2621.584763][T22738] slab_unreclaimable 1511424 [ 2621.584763][T22738] pgfault 192126 [ 2621.584763][T22738] pgmajfault 0 [ 2621.584763][T22738] workingset_refault 0 [ 2621.584763][T22738] workingset_activate 0 [ 2621.584763][T22738] workingset_nodereclaim 0 [ 2621.584763][T22738] pgrefill 35 [ 2621.584763][T22738] pgscan 365 [ 2621.584763][T22738] pgsteal 246 [ 2621.584763][T22738] pgactivate 66 [ 2621.589724][T22738] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=22738,uid=0 [ 2621.696359][T22738] Memory cgroup out of memory: Killed process 22738 (syz-executor.0) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 05:54:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x640a0000}, 0x0) [ 2621.758616][T24604] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:54:21 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) [ 2622.447662][T24597] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:54:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x2ee30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:54:22 executing program 0: write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x4, 0x2}, 0x0, 0x0, &(0x7f0000000200)={0x3, 0xe, 0x101}, &(0x7f0000000240)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x5d64}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r1, r2, 0x0, 0x89, &(0x7f0000000040)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) 05:54:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68010000}, 0x0) [ 2622.883817][T24616] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2623.484063][T24681] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:54:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x29e, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:22 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./\x00\x00\x00\x00\x00n\xa4', 0x200002, 0x0) 05:54:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68020000}, 0x0) 05:54:22 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.swap.current\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x108) 05:54:23 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) 05:54:23 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 05:54:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68030000}, 0x0) [ 2624.338371][T24701] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:54:23 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x40, 0x3f, 0x4, 0x1f, 0x0, 0x5, 0x94148, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x401, 0x9, @perf_config_ext={0x158, 0x7}, 0x2010c, 0x8, 0x6, 0x0, 0x4, 0x2, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) r1 = gettid() r2 = gettid() perf_event_open(&(0x7f0000000540)={0x5, 0x70, 0x8, 0x2, 0x81, 0x11, 0x0, 0x40, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xe52c, 0x0, @perf_config_ext={0x0, 0x401}, 0x100, 0x4a86, 0x7, 0x7, 0x2, 0x753, 0x9}, r2, 0x1, 0xffffffffffffffff, 0xc) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080)=0xffff, 0xffffff43) r4 = gettid() r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r5, 0x0, 0x1e, &(0x7f0000000240)='{nodev+em0ppp0trustedbdeveth0\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xfffffffffffffd64, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x6, 0x2003}, 0x0, 0x0, &(0x7f0000000640)={0x1, 0x0, 0x1, 0x8}, &(0x7f0000000480)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={r6, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000580)='memory.events\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000240)='pids.events\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r2, r3, 0x0, 0x1b, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', r8}, 0x30) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x98, 0x9, 0x8c, 0x0, 0x0, 0x76f6, 0xb, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0xc, @perf_config_ext={0x7fffffff, 0x2}, 0x1000, 0x7fffffff, 0x800, 0x4, 0xd4b, 0x5, 0x6}, r2, 0x100000000007, 0xffffffffffffffff, 0x1) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0xb, 0x70, 0x4, 0x1, 0x3, 0x7, 0x0, 0x1000, 0x1310, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x3, 0xfffffffffffffffc}, 0x42eab17bb7064a50, 0x800, 0x0, 0x9, 0x8, 0xfffffff9, 0x88fc}, 0xffffffffffffffff, 0x5, r9, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, r0, 0x0, 0x8, &(0x7f0000000140)='system:\x00'}, 0x30) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x6, 0x8, 0x2, 0x81, 0x0, 0x3f, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x6, @perf_config_ext={0x6, 0x101}, 0x16812, 0x7, 0x9, 0x9, 0x7fffffff, 0xc85, 0x7}, r10, 0x3, r11, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x40086602, 0x400007) openat$cgroup_ro(r12, 0x0, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x16\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r13, 0x4030582a, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0xe, 0x2, 0x2, 0x2d, 0x92, r3, 0xffff, [], 0x0, r13, 0x5, 0x4}, 0x3c) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r14, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r14, 0x2405, r0) [ 2624.767445][T24742] IPVS: ftp: loaded support on port[0] = 21 [ 2624.848471][T24752] IPVS: ftp: loaded support on port[0] = 21 [ 2624.919029][T24683] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2625.420013][ T32] device bridge_slave_1 left promiscuous mode [ 2625.426252][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2625.511351][ T32] device bridge_slave_0 left promiscuous mode [ 2625.517748][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2625.852677][ T32] device hsr_slave_0 left promiscuous mode [ 2625.909965][ T32] device hsr_slave_1 left promiscuous mode [ 2625.981147][ T32] team0 (unregistering): Port device team_slave_1 removed [ 2626.002884][ T32] team0 (unregistering): Port device team_slave_0 removed [ 2626.023697][ T32] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2626.094224][ T32] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2626.272761][ T32] bond0 (unregistering): Released all slaves [ 2626.462116][T24703] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:54:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x2fe30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2626.905757][T24767] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2627.579093][T24742] chnl_net:caif_netlink_parms(): no params data found [ 2627.615903][T24752] chnl_net:caif_netlink_parms(): no params data found [ 2627.734425][T24768] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2627.769361][T24752] bridge0: port 1(bridge_slave_0) entered blocking state [ 2627.778447][T24752] bridge0: port 1(bridge_slave_0) entered disabled state [ 2627.788558][T24752] device bridge_slave_0 entered promiscuous mode [ 2628.083694][T24752] bridge0: port 2(bridge_slave_1) entered blocking state [ 2628.095956][T24752] bridge0: port 2(bridge_slave_1) entered disabled state [ 2628.122264][T24752] device bridge_slave_1 entered promiscuous mode [ 2628.140092][T24742] bridge0: port 1(bridge_slave_0) entered blocking state [ 2628.147181][T24742] bridge0: port 1(bridge_slave_0) entered disabled state [ 2628.172291][T24742] device bridge_slave_0 entered promiscuous mode [ 2628.212769][T24742] bridge0: port 2(bridge_slave_1) entered blocking state [ 2628.230121][T24742] bridge0: port 2(bridge_slave_1) entered disabled state [ 2628.250433][T24742] device bridge_slave_1 entered promiscuous mode [ 2628.284381][T24752] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2628.322465][T24752] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2628.364457][T24742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2628.413442][T24742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2628.443212][T24752] team0: Port device team_slave_0 added [ 2628.455948][T24752] team0: Port device team_slave_1 added [ 2628.521004][T24742] team0: Port device team_slave_0 added [ 2628.532572][T24742] team0: Port device team_slave_1 added [ 2628.574510][T24752] device hsr_slave_0 entered promiscuous mode [ 2628.631224][T24752] device hsr_slave_1 entered promiscuous mode [ 2628.680108][T24752] debugfs: Directory 'hsr0' with parent '/' already present! [ 2628.804523][T24742] device hsr_slave_0 entered promiscuous mode [ 2628.861549][T24742] device hsr_slave_1 entered promiscuous mode [ 2628.899945][T24742] debugfs: Directory 'hsr0' with parent '/' already present! [ 2629.162368][T24752] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2629.177752][T24742] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2629.217817][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2629.227145][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2629.241274][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2629.252000][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2629.264492][T24742] 8021q: adding VLAN 0 to HW filter on device team0 [ 2629.286064][T24752] 8021q: adding VLAN 0 to HW filter on device team0 [ 2629.323173][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2629.334026][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2629.360886][T10761] bridge0: port 1(bridge_slave_0) entered blocking state [ 2629.367953][T10761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2629.376477][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2629.386490][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2629.395569][T10761] bridge0: port 2(bridge_slave_1) entered blocking state [ 2629.402709][T10761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2629.431286][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2629.441450][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2629.451445][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2629.461116][T19418] bridge0: port 1(bridge_slave_0) entered blocking state [ 2629.468182][T19418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2629.476564][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2629.503431][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2629.513297][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2629.523591][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2629.532877][T19418] bridge0: port 2(bridge_slave_1) entered blocking state [ 2629.540013][T19418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2629.549082][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2629.560496][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2629.582962][ T32] device 0 left promiscuous mode [ 2629.594783][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2629.605635][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2629.615806][T10761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2629.638355][ T32] device 0 left promiscuous mode [ 2629.665268][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2629.674986][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2629.685669][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2629.697452][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2629.708463][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2629.719156][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2629.740580][ T32] device 1 left promiscuous mode [ 2629.752923][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2629.763627][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2629.774459][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2629.784793][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2629.806563][T24742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2629.821834][ T32] device 2 left promiscuous mode [ 2629.834667][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2629.844291][T25921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2629.870890][T24752] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2629.883303][T24752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2629.893545][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2629.903554][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2629.916120][ T32] device 3 left promiscuous mode [ 2629.959691][T24742] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2629.994357][T24752] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2630.009540][ T32] device 0 left promiscuous mode [ 2630.060648][ T32] device 1 left promiscuous mode [ 2630.317222][T24807] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2630.332590][T24807] CPU: 1 PID: 24807 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2630.340515][T24807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2630.350577][T24807] Call Trace: [ 2630.353887][T24807] dump_stack+0x172/0x1f0 [ 2630.358238][T24807] dump_header+0x10b/0x82d [ 2630.362664][T24807] oom_kill_process.cold+0x10/0x15 [ 2630.367791][T24807] out_of_memory+0x334/0x1340 [ 2630.372483][T24807] ? __sched_text_start+0x8/0x8 [ 2630.377337][T24807] ? oom_killer_disable+0x280/0x280 [ 2630.382550][T24807] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2630.388092][T24807] ? memcg_stat_show+0xc40/0xc40 [ 2630.393042][T24807] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2630.398855][T24807] ? cgroup_file_notify+0x140/0x1b0 [ 2630.404061][T24807] memory_max_write+0x262/0x3a0 [ 2630.408916][T24807] ? mem_cgroup_write+0x370/0x370 [ 2630.413942][T24807] ? lock_acquire+0x190/0x410 [ 2630.418618][T24807] ? kernfs_fop_write+0x227/0x480 [ 2630.423652][T24807] cgroup_file_write+0x241/0x790 [ 2630.428638][T24807] ? mem_cgroup_write+0x370/0x370 [ 2630.433668][T24807] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2630.439310][T24807] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2630.444948][T24807] kernfs_fop_write+0x2b8/0x480 [ 2630.449802][T24807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2630.456056][T24807] __vfs_write+0x8a/0x110 [ 2630.460392][T24807] ? kernfs_fop_open+0xd80/0xd80 [ 2630.465334][T24807] vfs_write+0x268/0x5d0 [ 2630.469585][T24807] ksys_write+0x14f/0x290 [ 2630.473917][T24807] ? __ia32_sys_read+0xb0/0xb0 [ 2630.478681][T24807] ? do_syscall_64+0x26/0x760 [ 2630.483368][T24807] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2630.489442][T24807] ? do_syscall_64+0x26/0x760 [ 2630.494127][T24807] __x64_sys_write+0x73/0xb0 [ 2630.498720][T24807] do_syscall_64+0xfa/0x760 [ 2630.503226][T24807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2630.509116][T24807] RIP: 0033:0x459a59 [ 2630.513015][T24807] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2630.532626][T24807] RSP: 002b:00007f05c1f82c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2630.541048][T24807] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2630.549026][T24807] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 2630.557006][T24807] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2630.564983][T24807] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05c1f836d4 [ 2630.572957][T24807] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2630.589470][T24807] memory: usage 6752kB, limit 0kB, failcnt 582 [ 2630.595971][T24807] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2630.602959][T24807] Memory cgroup stats for /syz4: [ 2630.603059][T24807] anon 4243456 [ 2630.603059][T24807] file 49152 [ 2630.603059][T24807] kernel_stack 65536 [ 2630.603059][T24807] slab 2420736 [ 2630.603059][T24807] sock 0 [ 2630.603059][T24807] shmem 221184 [ 2630.603059][T24807] file_mapped 0 [ 2630.603059][T24807] file_dirty 135168 [ 2630.603059][T24807] file_writeback 0 [ 2630.603059][T24807] anon_thp 4194304 [ 2630.603059][T24807] inactive_anon 135168 [ 2630.603059][T24807] active_anon 4243456 [ 2630.603059][T24807] inactive_file 16384 [ 2630.603059][T24807] active_file 12288 [ 2630.603059][T24807] unevictable 0 [ 2630.603059][T24807] slab_reclaimable 1486848 [ 2630.603059][T24807] slab_unreclaimable 933888 [ 2630.603059][T24807] pgfault 258918 [ 2630.603059][T24807] pgmajfault 0 [ 2630.603059][T24807] workingset_refault 0 [ 2630.603059][T24807] workingset_activate 0 [ 2630.603059][T24807] workingset_nodereclaim 0 [ 2630.603059][T24807] pgrefill 1643 [ 2630.603059][T24807] pgscan 7112 [ 2630.603059][T24807] pgsteal 3188 [ 2630.700696][T24807] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24806,uid=0 [ 2630.717908][T24807] Memory cgroup out of memory: Killed process 24806 (syz-executor.4) total-vm:72580kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 2630.740149][ T1071] oom_reaper: reaped process 24806 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 05:54:30 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:54:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68040000}, 0x0) 05:54:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000540)='syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0xfa, 0x5, 0x7f, 0x0, 0x0, 0x3, 0x10, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x1000, 0x6f5, 0xffff, 0x2, 0x3, 0x80000001, 0x8001}, 0x0, 0x4, r3, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x1f, 0x7e, 0x3, 0x8, 0x0, 0x5, 0x28020, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x949956ebb2065002, @perf_bp={&(0x7f00000000c0), 0x2}, 0x22800, 0x6, 0x8, 0x9, 0x3, 0x1, 0x400}, r3, 0x0, r4, 0x6) openat$cgroup_ro(r0, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r5, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x5, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000000300)={0x1, 0xa, 0x8, 0x4}, &(0x7f0000000340)=0x2cab, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x94}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=r6, 0x4) 05:54:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x29f, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x30e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:54:30 executing program 0: r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000080), 0x4) recvmsg$kcm(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@pppol2tpin6, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/27, 0x1b}, {&(0x7f0000000140)=""/103, 0x67}, {&(0x7f00000002c0)=""/206, 0xce}], 0x3, &(0x7f0000000480)=""/241, 0x479}, 0x2000) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x2b8, 0x2}, 0x80, &(0x7f0000000000), 0x2b8, &(0x7f00000002c0), 0x0, 0x1a0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000005c0)=r1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000a640)={&(0x7f000000a380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f000000a500)=[{&(0x7f000000a400)=""/32, 0x20}, {&(0x7f000000a440)=""/76, 0x4c}, {&(0x7f000000a4c0)=""/24, 0x18}], 0x3, &(0x7f000000a540)=""/196, 0xc4}, 0x102) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5P\x8a\x06\x00\x00\x00\xb9\x0f\xf8\r\x9aB\x81\xc8\xaal\xddoL_`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x19\xe0\xc6\x1f\xf2/\xf6\x1f\x00\xa8P\'\xaf\x132\xfd\x10\xe7\xbe\x03Q\x10\x9e\xb1\xdc!&\xe5\xdaX#\xb9\xb4\x8a7\nNd)<%\xfc\xaf\x1cA', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f000000a680)={0x19, 0x75, 0x200, 0x1, 0x18c, r2, 0x4, [], r3, r4, 0x4, 0x3}, 0x3c) [ 2630.843946][T24752] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2630.888918][T24833] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2630.901406][T24752] CPU: 1 PID: 24752 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2630.909326][T24752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2630.919388][T24752] Call Trace: [ 2630.922689][T24752] dump_stack+0x172/0x1f0 [ 2630.927032][T24752] dump_header+0x10b/0x82d [ 2630.931458][T24752] ? oom_kill_process+0x94/0x3f0 [ 2630.936417][T24752] oom_kill_process.cold+0x10/0x15 [ 2630.941538][T24752] out_of_memory+0x334/0x1340 [ 2630.946218][T24752] ? lock_downgrade+0x920/0x920 [ 2630.951088][T24752] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2630.956901][T24752] ? oom_killer_disable+0x280/0x280 [ 2630.956929][T24752] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2630.956949][T24752] ? memcg_stat_show+0xc40/0xc40 [ 2630.972605][T24752] ? do_raw_spin_unlock+0x57/0x270 [ 2630.977721][T24752] ? _raw_spin_unlock+0x2d/0x50 [ 2630.982573][T24752] try_charge+0xf4b/0x1440 [ 2630.982601][T24752] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2630.982614][T24752] ? percpu_ref_tryget_live+0x111/0x290 [ 2630.982633][T24752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2630.982648][T24752] ? __kasan_check_read+0x11/0x20 [ 2630.982668][T24752] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2630.982687][T24752] mem_cgroup_try_charge+0x136/0x590 [ 2630.982710][T24752] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2630.982730][T24752] __handle_mm_fault+0x1f0d/0x4040 [ 2630.982748][T24752] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2630.982763][T24752] ? handle_mm_fault+0x292/0xaa0 [ 2630.982791][T24752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2630.982807][T24752] ? __kasan_check_read+0x11/0x20 [ 2630.982826][T24752] handle_mm_fault+0x3b7/0xaa0 [ 2630.982847][T24752] __do_page_fault+0x536/0xdd0 [ 2630.982871][T24752] do_page_fault+0x38/0x590 [ 2630.982890][T24752] page_fault+0x39/0x40 [ 2630.982905][T24752] RIP: 0033:0x403522 [ 2630.998498][T24752] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 2630.998507][T24752] RSP: 002b:00007ffdcd31ae20 EFLAGS: 00010246 [ 2630.998519][T24752] RAX: 0000000000000000 RBX: 0000000000282272 RCX: 0000000000413660 [ 2630.998532][T24752] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffdcd31bf50 [ 2631.041761][T24752] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001a4e940 [ 2631.041771][T24752] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdcd31bf50 [ 2631.041779][T24752] R13: 00007ffdcd31bf40 R14: 0000000000000000 R15: 00007ffdcd31bf50 [ 2631.189884][T24752] memory: usage 2376kB, limit 0kB, failcnt 590 [ 2631.197302][T24752] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2631.240812][T24752] Memory cgroup stats for /syz4: [ 2631.240922][T24752] anon 45056 [ 2631.240922][T24752] file 49152 [ 2631.240922][T24752] kernel_stack 0 [ 2631.240922][T24752] slab 2420736 [ 2631.240922][T24752] sock 0 [ 2631.240922][T24752] shmem 221184 [ 2631.240922][T24752] file_mapped 0 [ 2631.240922][T24752] file_dirty 135168 [ 2631.240922][T24752] file_writeback 0 [ 2631.240922][T24752] anon_thp 0 [ 2631.240922][T24752] inactive_anon 135168 [ 2631.240922][T24752] active_anon 45056 [ 2631.240922][T24752] inactive_file 16384 05:54:30 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='.\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe888e158658f66cf) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r2, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) socket$kcm(0x29, 0x7, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r1, 0x0, 0x1a, 0x8f, &(0x7f0000000200)="92cb19420f20d04512d8812cf7cbe93f4b92e5d97ddd7588980de15d3b2b873a20a7010df757cc30c1fa8173e5b40f5fffa604667c48b89835f7886f1be4841c4ebc0900b60b8b89e13ebd6b104c7fda539cf62a2c6a90b781994a09b7a96e63ac8c7a101012", &(0x7f00000004c0)=""/154, 0xfff, 0x0, 0xffffff17, 0x0, &(0x7f0000000100)="3645ce6b6c20bfbfacf2cafb5a3d678b681a8d3c8aa063166da27eedbc8a4232fa5c8d", &(0x7f0000000740)="5013bc27bee863b584ba5760377dfa92ac77fbb9737f2705437e687398902cac096c417d9903209f0ffabf57823f0faa3990aa474be2e93d00862d467a0de3a635d1653da00a7631941103b8c4f9bd278dad389108af37c777ee3f331be77df4708231a2b627bb119b55eba79e3fc0e606d92b5af2ad1078f1f697852fbf5a0f893583d11f65d066c65614403a0fd05100ee1c1c841ba7a85bca36e56149c6f8376ce59716b4634b30e7ef8f93f09266f97f188c045141fe8c16be5907724ecaa748e440310a"}, 0x160) openat$cgroup_ro(r3, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, r1, 0xf, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xa4) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f00000000c0)) write$cgroup_int(r6, &(0x7f0000000080), 0x297ef) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000700)=0xffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x3, 0x0, &(0x7f0000000140)) write$cgroup_int(r4, 0x0, 0x0) 05:54:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000080)=0xffffffffffffffff, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 2631.240922][T24752] active_file 12288 [ 2631.240922][T24752] unevictable 0 [ 2631.240922][T24752] slab_reclaimable 1486848 [ 2631.240922][T24752] slab_unreclaimable 933888 [ 2631.240922][T24752] pgfault 258918 [ 2631.240922][T24752] pgmajfault 0 [ 2631.240922][T24752] workingset_refault 0 [ 2631.240922][T24752] workingset_activate 0 [ 2631.240922][T24752] workingset_nodereclaim 0 [ 2631.240922][T24752] pgrefill 1643 [ 2631.240922][T24752] pgscan 7112 [ 2631.240922][T24752] pgsteal 3188 [ 2631.240922][T24752] pgactivate 2805 [ 2631.426675][T24865] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:54:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68060000}, 0x0) 05:54:30 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/s\xd8yz\x04\x00\x9b\x00\x87\xd8-\x04=\r\xf7\xba\xe4\xe1\\\xb0\bHQ\x1bE.N<$\xfa\xefE\xfb#u7 c{\x0f\xba\nE\x8c\xf5\xbe\xb4sqG\x01\x81\xc7]/\xd8{n\x10\x115\xa6 s\x15$\xcag\xcd\x83\x9fK\x8f\xd4\xd7C\x97\xdf\xc2}\xacTB\xbbz\x97\xde\x99\x8df\xb1\x1cI14\x19\xd3\xe2\xfe\xbb]\\3\x1e/C5\xeb)\x19U\x13\xb0\n\xfe\x13g\x89b\x93\xa0\xfc\x98\xd8\x15\xcb', 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 2631.771175][T24752] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24752,uid=0 05:54:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) getpid() recvmsg(0xffffffffffffffff, &(0x7f0000015bc0)={&(0x7f0000015480)=@can={0x1d, 0x0}, 0x80, &(0x7f0000015a40)=[{&(0x7f0000015500)=""/194, 0xc2}, {&(0x7f0000015600)=""/101, 0x65}, {&(0x7f0000015680)=""/250, 0xfa}, {&(0x7f0000015780)=""/24, 0x18}, {&(0x7f00000157c0)=""/218, 0xda}, {&(0x7f00000158c0)=""/186, 0xba}, {&(0x7f0000015980)=""/134, 0x86}], 0x7, &(0x7f0000015ac0)=""/249, 0xf9}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = openat$cgroup_ro(r1, &(0x7f0000015c00)='pids.events\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000015c40)={0x7, 0x8000, 0x8, 0x110, 0x348, 0x1, 0x5, [], r0, r2, 0x4, 0x4}, 0x3c) [ 2631.839969][T24752] Memory cgroup out of memory: Killed process 24752 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 2631.900570][ T1071] oom_reaper: reaped process 24752 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2631.911993][T24865] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2631.980310][T24865] CPU: 1 PID: 24865 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 2631.988256][T24865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2631.998327][T24865] Call Trace: [ 2632.001636][T24865] dump_stack+0x172/0x1f0 [ 2632.005986][T24865] dump_header+0x10b/0x82d [ 2632.010424][T24865] oom_kill_process.cold+0x10/0x15 [ 2632.015552][T24865] out_of_memory+0x334/0x1340 [ 2632.020252][T24865] ? oom_killer_disable+0x280/0x280 [ 2632.025472][T24865] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2632.031034][T24865] ? memcg_stat_show+0xc40/0xc40 [ 2632.035994][T24865] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2632.041820][T24865] ? cgroup_file_notify+0x140/0x1b0 [ 2632.047044][T24865] memory_max_write+0x262/0x3a0 [ 2632.051909][T24865] ? mem_cgroup_write+0x370/0x370 [ 2632.056943][T24865] ? __this_cpu_preempt_check+0x3a/0x210 [ 2632.062571][T24865] ? retint_kernel+0x2b/0x2b [ 2632.062593][T24865] cgroup_file_write+0x241/0x790 [ 2632.062610][T24865] ? mem_cgroup_write+0x370/0x370 05:54:31 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)='-\x00', 0xffffffffffffffff}, 0x30) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x40, 0x80, 0x3f, 0x3, 0x0, 0x3, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x8, 0x4}, 0x4900, 0xfffffffffffffff9, 0x80, 0x0, 0x6fa7, 0x78, 0x1}, r0, 0x9, r1, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) [ 2632.062624][T24865] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2632.062645][T24865] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2632.062661][T24865] kernfs_fop_write+0x2b8/0x480 [ 2632.062677][T24865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2632.062694][T24865] __vfs_write+0x8a/0x110 [ 2632.062706][T24865] ? kernfs_fop_open+0xd80/0xd80 [ 2632.062722][T24865] vfs_write+0x268/0x5d0 [ 2632.062739][T24865] ksys_write+0x14f/0x290 [ 2632.117345][T24865] ? __ia32_sys_read+0xb0/0xb0 [ 2632.122215][T24865] ? do_syscall_64+0x26/0x760 [ 2632.126901][T24865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2632.132976][T24865] ? do_syscall_64+0x26/0x760 [ 2632.137671][T24865] __x64_sys_write+0x73/0xb0 [ 2632.142272][T24865] do_syscall_64+0xfa/0x760 [ 2632.146788][T24865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2632.152680][T24865] RIP: 0033:0x459a59 [ 2632.156584][T24865] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2632.176192][T24865] RSP: 002b:00007f4326696c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2632.184615][T24865] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2632.192593][T24865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 2632.200572][T24865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2632.208550][T24865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43266976d4 [ 2632.216525][T24865] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2632.247164][T24865] memory: usage 6804kB, limit 0kB, failcnt 91 [ 2632.253474][T24865] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2632.260532][T24865] Memory cgroup stats for /syz0: [ 2632.260637][T24865] anon 2273280 [ 2632.260637][T24865] file 151552 [ 2632.260637][T24865] kernel_stack 65536 [ 2632.260637][T24865] slab 4485120 [ 2632.260637][T24865] sock 0 [ 2632.260637][T24865] shmem 0 [ 2632.260637][T24865] file_mapped 0 [ 2632.260637][T24865] file_dirty 135168 [ 2632.260637][T24865] file_writeback 0 [ 2632.260637][T24865] anon_thp 2097152 [ 2632.260637][T24865] inactive_anon 0 [ 2632.260637][T24865] active_anon 2199552 [ 2632.260637][T24865] inactive_file 49152 [ 2632.260637][T24865] active_file 0 [ 2632.260637][T24865] unevictable 0 [ 2632.260637][T24865] slab_reclaimable 2973696 [ 2632.260637][T24865] slab_unreclaimable 1511424 [ 2632.260637][T24865] pgfault 192324 [ 2632.260637][T24865] pgmajfault 0 [ 2632.260637][T24865] workingset_refault 0 [ 2632.260637][T24865] workingset_activate 0 [ 2632.260637][T24865] workingset_nodereclaim 0 [ 2632.260637][T24865] pgrefill 35 [ 2632.260637][T24865] pgscan 365 [ 2632.260637][T24865] pgsteal 246 [ 2632.260637][T24865] pgactivate 66 [ 2632.356846][T24865] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24863,uid=0 [ 2632.356993][T24865] Memory cgroup out of memory: Killed process 24863 (syz-executor.0) total-vm:72840kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 2632.370061][ T1071] oom_reaper: reaped process 24863 (syz-executor.0), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB [ 2632.484487][T24742] syz-executor.0 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 2632.515371][T24742] CPU: 0 PID: 24742 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 2632.523297][T24742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2632.533346][T24742] Call Trace: [ 2632.536636][T24742] dump_stack+0x172/0x1f0 [ 2632.540969][T24742] dump_header+0x10b/0x82d [ 2632.545382][T24742] ? oom_kill_process+0x94/0x3f0 [ 2632.550318][T24742] oom_kill_process.cold+0x10/0x15 [ 2632.555425][T24742] out_of_memory+0x334/0x1340 [ 2632.560097][T24742] ? lock_downgrade+0x920/0x920 [ 2632.564947][T24742] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2632.570757][T24742] ? oom_killer_disable+0x280/0x280 [ 2632.575961][T24742] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2632.581503][T24742] ? memcg_stat_show+0xc40/0xc40 [ 2632.586439][T24742] ? do_raw_spin_unlock+0x57/0x270 [ 2632.591550][T24742] ? _raw_spin_unlock+0x2d/0x50 [ 2632.596400][T24742] try_charge+0xf4b/0x1440 [ 2632.600822][T24742] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2632.606363][T24742] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2632.611906][T24742] ? cache_grow_begin+0x122/0xd20 [ 2632.616926][T24742] ? find_held_lock+0x35/0x130 [ 2632.621688][T24742] ? cache_grow_begin+0x122/0xd20 [ 2632.626713][T24742] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2632.632254][T24742] ? lock_downgrade+0x920/0x920 [ 2632.637101][T24742] ? memcg_kmem_put_cache+0x50/0x50 [ 2632.642308][T24742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2632.648550][T24742] ? __kasan_check_read+0x11/0x20 [ 2632.653572][T24742] cache_grow_begin+0x629/0xd20 [ 2632.658419][T24742] ? __sanitizer_cov_trace_cmp4+0x11/0x20 [ 2632.664142][T24742] ? mempolicy_slab_node+0x139/0x390 [ 2632.669426][T24742] fallback_alloc+0x1fd/0x2d0 [ 2632.674104][T24742] ____cache_alloc_node+0x1bc/0x1d0 [ 2632.679301][T24742] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2632.685535][T24742] kmem_cache_alloc+0x1ef/0x710 [ 2632.690392][T24742] alloc_inode+0x16f/0x1e0 [ 2632.694804][T24742] iget_locked+0x1a6/0x4b0 [ 2632.699217][T24742] kernfs_get_inode+0x4e/0x580 [ 2632.703981][T24742] kernfs_iop_lookup+0x1ab/0x230 [ 2632.708914][T24742] __lookup_slow+0x279/0x500 [ 2632.713500][T24742] ? vfs_unlink+0x620/0x620 [ 2632.718036][T24742] lookup_slow+0x58/0x80 [ 2632.722275][T24742] path_mountpoint+0x5d2/0x1e60 [ 2632.727132][T24742] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2632.732677][T24742] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2632.738664][T24742] ? path_openat+0x46d0/0x46d0 [ 2632.743432][T24742] filename_mountpoint+0x18e/0x390 [ 2632.748544][T24742] ? filename_parentat.isra.0+0x410/0x410 [ 2632.754256][T24742] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2632.760413][T24742] ? __phys_addr_symbol+0x30/0x70 [ 2632.765432][T24742] ? __check_object_size+0x3d/0x437 [ 2632.770631][T24742] ? strncpy_from_user+0x2b4/0x400 [ 2632.775745][T24742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2632.781977][T24742] ? getname_flags+0x277/0x5b0 [ 2632.786742][T24742] user_path_mountpoint_at+0x3a/0x50 [ 2632.792026][T24742] ksys_umount+0x164/0xf00 [ 2632.796440][T24742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2632.802698][T24742] ? __detach_mounts+0x2a0/0x2a0 [ 2632.807648][T24742] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2632.813107][T24742] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2632.818551][T24742] ? do_syscall_64+0x26/0x760 [ 2632.823212][T24742] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2632.829258][T24742] ? do_syscall_64+0x26/0x760 [ 2632.833915][T24742] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2632.839183][T24742] __x64_sys_umount+0x54/0x80 [ 2632.843843][T24742] do_syscall_64+0xfa/0x760 [ 2632.848330][T24742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2632.854203][T24742] RIP: 0033:0x45c487 [ 2632.858179][T24742] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2632.877763][T24742] RSP: 002b:00007ffef9dc0948 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 2632.886156][T24742] RAX: ffffffffffffffda RBX: 0000000000282a15 RCX: 000000000045c487 [ 2632.894109][T24742] RDX: 0000000000403550 RSI: 0000000000000002 RDI: 00007ffef9dc09f0 [ 2632.902061][T24742] RBP: 0000000000000009 R08: 0000000000000000 R09: 000000000000000e [ 2632.910015][T24742] R10: 000000000000000a R11: 0000000000000202 R12: 00007ffef9dc1a80 [ 2632.917968][T24742] R13: 0000000002330940 R14: 0000000000000000 R15: 00007ffef9dc1a80 [ 2632.934017][T24742] memory: usage 4420kB, limit 0kB, failcnt 104 [ 2632.940552][T24742] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2632.947534][T24742] Memory cgroup stats for /syz0: [ 2632.947656][T24742] anon 155648 [ 2632.947656][T24742] file 151552 [ 2632.947656][T24742] kernel_stack 0 [ 2632.947656][T24742] slab 4485120 [ 2632.947656][T24742] sock 0 [ 2632.947656][T24742] shmem 0 [ 2632.947656][T24742] file_mapped 0 [ 2632.947656][T24742] file_dirty 135168 [ 2632.947656][T24742] file_writeback 0 [ 2632.947656][T24742] anon_thp 0 [ 2632.947656][T24742] inactive_anon 0 [ 2632.947656][T24742] active_anon 81920 [ 2632.947656][T24742] inactive_file 49152 [ 2632.947656][T24742] active_file 0 [ 2632.947656][T24742] unevictable 0 [ 2632.947656][T24742] slab_reclaimable 2973696 [ 2632.947656][T24742] slab_unreclaimable 1511424 [ 2632.947656][T24742] pgfault 192324 [ 2632.947656][T24742] pgmajfault 0 [ 2632.947656][T24742] workingset_refault 0 [ 2632.947656][T24742] workingset_activate 0 [ 2632.947656][T24742] workingset_nodereclaim 0 [ 2632.947656][T24742] pgrefill 35 [ 2632.947656][T24742] pgscan 365 [ 2632.947656][T24742] pgsteal 246 [ 2632.947656][T24742] pgactivate 66 [ 2633.044203][T24742] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24742,uid=0 [ 2633.060389][T24742] Memory cgroup out of memory: Killed process 24742 (syz-executor.0) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 2633.080131][ T1071] oom_reaper: reaped process 24742 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 05:54:44 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:54:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 05:54:44 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='.\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe888e158658f66cf) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r2, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) socket$kcm(0x29, 0x7, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r1, 0x0, 0x1a, 0x8f, &(0x7f0000000200)="92cb19420f20d04512d8812cf7cbe93f4b92e5d97ddd7588980de15d3b2b873a20a7010df757cc30c1fa8173e5b40f5fffa604667c48b89835f7886f1be4841c4ebc0900b60b8b89e13ebd6b104c7fda539cf62a2c6a90b781994a09b7a96e63ac8c7a101012", &(0x7f00000004c0)=""/154, 0xfff, 0x0, 0xffffff17, 0x0, &(0x7f0000000100)="3645ce6b6c20bfbfacf2cafb5a3d678b681a8d3c8aa063166da27eedbc8a4232fa5c8d", &(0x7f0000000740)="5013bc27bee863b584ba5760377dfa92ac77fbb9737f2705437e687398902cac096c417d9903209f0ffabf57823f0faa3990aa474be2e93d00862d467a0de3a635d1653da00a7631941103b8c4f9bd278dad389108af37c777ee3f331be77df4708231a2b627bb119b55eba79e3fc0e606d92b5af2ad1078f1f697852fbf5a0f893583d11f65d066c65614403a0fd05100ee1c1c841ba7a85bca36e56149c6f8376ce59716b4634b30e7ef8f93f09266f97f188c045141fe8c16be5907724ecaa748e440310a"}, 0x160) openat$cgroup_ro(r3, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, r1, 0xf, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xa4) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f00000000c0)) write$cgroup_int(r6, &(0x7f0000000080), 0x297ef) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000700)=0xffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x3, 0x0, &(0x7f0000000140)) write$cgroup_int(r4, 0x0, 0x0) [ 2645.086033][T24840] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2651.499280][T24841] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2663.624604][T24844] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:55:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x2a0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:55:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68080000}, 0x0) 05:55:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 05:55:10 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='.\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe888e158658f66cf) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r2, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) socket$kcm(0x29, 0x7, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r1, 0x0, 0x1a, 0x8f, &(0x7f0000000200)="92cb19420f20d04512d8812cf7cbe93f4b92e5d97ddd7588980de15d3b2b873a20a7010df757cc30c1fa8173e5b40f5fffa604667c48b89835f7886f1be4841c4ebc0900b60b8b89e13ebd6b104c7fda539cf62a2c6a90b781994a09b7a96e63ac8c7a101012", &(0x7f00000004c0)=""/154, 0xfff, 0x0, 0xffffff17, 0x0, &(0x7f0000000100)="3645ce6b6c20bfbfacf2cafb5a3d678b681a8d3c8aa063166da27eedbc8a4232fa5c8d", &(0x7f0000000740)="5013bc27bee863b584ba5760377dfa92ac77fbb9737f2705437e687398902cac096c417d9903209f0ffabf57823f0faa3990aa474be2e93d00862d467a0de3a635d1653da00a7631941103b8c4f9bd278dad389108af37c777ee3f331be77df4708231a2b627bb119b55eba79e3fc0e606d92b5af2ad1078f1f697852fbf5a0f893583d11f65d066c65614403a0fd05100ee1c1c841ba7a85bca36e56149c6f8376ce59716b4634b30e7ef8f93f09266f97f188c045141fe8c16be5907724ecaa748e440310a"}, 0x160) openat$cgroup_ro(r3, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, r1, 0xf, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xa4) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f00000000c0)) write$cgroup_int(r6, &(0x7f0000000080), 0x297ef) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000700)=0xffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x3, 0x0, &(0x7f0000000140)) write$cgroup_int(r4, 0x0, 0x0) 05:55:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x31e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:55:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) [ 2671.698042][T24926] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:55:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) 05:55:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x15, 0x1, 0x2e74, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) 05:55:11 executing program 2: socketpair(0xf633422799e0771a, 0x80000, 0x40, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:55:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\t\x03\x88IG)up\x94o\xc9\xf1\x0ecp/c\x93\x8f~bH\xa4\xd5\xa5\x18\xffy:\xaa\x85C\xfb\xff\xe3\x00?', 0x200002, 0x0) 05:55:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:55:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r1 = gettid() r2 = gettid() r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r4}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x6, 0x7, 0x20, 0x0, 0x0, 0x1000, 0x20010, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2e5, 0x6, @perf_config_ext={0x307, 0x1}, 0x10000, 0x401, 0x71, 0x5, 0x1, 0x401, 0x5}, r3, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x3, 0x6e, 0x6, 0x4, 0x0, 0x2, 0x4, 0xf, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x1, 0x0, 0x7, 0x5, 0x9, 0x7f}, r2, 0xf, r0, 0xb) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x8, 0x81, 0x9, 0x6, 0x0, 0xa4e, 0x10010, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x932, 0x7, @perf_config_ext={0xa9f4, 0x5}, 0x2000, 0x3, 0x4, 0x6, 0xd8, 0x9, 0x2}, r1, 0x3, r5, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 2678.520679][T24999] device nr0 entered promiscuous mode [ 2678.538939][T25002] IPVS: ftp: loaded support on port[0] = 21 [ 2678.576616][T24937] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2678.587527][T25004] IPVS: ftp: loaded support on port[0] = 21 [ 2690.567554][T24932] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:55:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x2a1, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:55:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:55:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68090000}, 0x0) [ 2697.127194][T25015] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2697.533386][T25018] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2697.914988][T25002] chnl_net:caif_netlink_parms(): no params data found [ 2698.025998][T25004] chnl_net:caif_netlink_parms(): no params data found [ 2698.076347][T25002] bridge0: port 1(bridge_slave_0) entered blocking state [ 2698.084529][T25002] bridge0: port 1(bridge_slave_0) entered disabled state [ 2698.094193][T25002] device bridge_slave_0 entered promiscuous mode [ 2698.167459][T25002] bridge0: port 2(bridge_slave_1) entered blocking state [ 2698.175638][T25002] bridge0: port 2(bridge_slave_1) entered disabled state [ 2698.186277][T25002] device bridge_slave_1 entered promiscuous mode [ 2698.205987][T25004] bridge0: port 1(bridge_slave_0) entered blocking state [ 2698.213615][T25004] bridge0: port 1(bridge_slave_0) entered disabled state [ 2698.222998][T25004] device bridge_slave_0 entered promiscuous mode [ 2698.305562][T25004] bridge0: port 2(bridge_slave_1) entered blocking state [ 2698.315661][T25004] bridge0: port 2(bridge_slave_1) entered disabled state [ 2698.330775][T25004] device bridge_slave_1 entered promiscuous mode [ 2698.349174][T25002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2698.429465][T25002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2698.455807][T25004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2698.488580][T25004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2698.558085][T25002] team0: Port device team_slave_0 added [ 2698.579677][T25002] team0: Port device team_slave_1 added [ 2698.590082][T25004] team0: Port device team_slave_0 added [ 2698.598935][T25004] team0: Port device team_slave_1 added [ 2698.724612][T25002] device hsr_slave_0 entered promiscuous mode [ 2698.761533][T25002] device hsr_slave_1 entered promiscuous mode [ 2698.829875][T25002] debugfs: Directory 'hsr0' with parent '/' already present! [ 2698.884216][T25004] device hsr_slave_0 entered promiscuous mode [ 2698.941858][T25004] device hsr_slave_1 entered promiscuous mode [ 2699.010761][T25004] debugfs: Directory 'hsr0' with parent '/' already present! [ 2699.301371][T25004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2699.325607][T25002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2699.426339][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2699.435893][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2699.452030][T25004] 8021q: adding VLAN 0 to HW filter on device team0 [ 2699.467679][T25002] 8021q: adding VLAN 0 to HW filter on device team0 [ 2699.477418][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2699.487790][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2699.654429][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2699.664857][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2699.675125][T24808] bridge0: port 1(bridge_slave_0) entered blocking state [ 2699.682253][T24808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2699.691931][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2699.701911][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2699.711428][T24808] bridge0: port 2(bridge_slave_1) entered blocking state [ 2699.718508][T24808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2699.727652][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2699.738368][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2699.748059][T24808] bridge0: port 1(bridge_slave_0) entered blocking state [ 2699.755203][T24808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2699.780786][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2699.801042][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2699.811737][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2699.822580][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2699.833100][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2699.842779][T24810] bridge0: port 2(bridge_slave_1) entered blocking state [ 2699.849899][T24810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2699.943784][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2699.956516][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2699.983134][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2700.001957][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2700.013094][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2700.023341][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2700.033994][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2700.113714][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2700.123597][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2700.134270][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2700.146692][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2700.156993][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2700.167844][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2700.178180][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2700.188396][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2700.262626][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2700.278848][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2700.289368][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2700.302287][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2700.312325][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2700.322400][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2700.337678][T25002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2700.350793][T25004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2700.529124][T25004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2700.546373][T25002] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2700.885993][T25058] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 2700.969601][T25057] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2701.025868][T25057] CPU: 0 PID: 25057 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2701.033812][T25057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2701.043880][T25057] Call Trace: [ 2701.047195][T25057] dump_stack+0x172/0x1f0 [ 2701.051549][T25057] dump_header+0x10b/0x82d [ 2701.055985][T25057] oom_kill_process.cold+0x10/0x15 [ 2701.061124][T25057] out_of_memory+0x334/0x1340 [ 2701.065826][T25057] ? __sched_text_start+0x8/0x8 [ 2701.070702][T25057] ? oom_killer_disable+0x280/0x280 [ 2701.075936][T25057] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2701.081498][T25057] ? memcg_stat_show+0xc40/0xc40 [ 2701.086463][T25057] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2701.092291][T25057] ? cgroup_file_notify+0x140/0x1b0 [ 2701.097518][T25057] memory_max_write+0x262/0x3a0 [ 2701.102397][T25057] ? mem_cgroup_write+0x370/0x370 [ 2701.107439][T25057] ? lock_acquire+0x190/0x410 [ 2701.112126][T25057] ? kernfs_fop_write+0x227/0x480 [ 2701.117151][T25057] cgroup_file_write+0x241/0x790 [ 2701.122084][T25057] ? mem_cgroup_write+0x370/0x370 [ 2701.127143][T25057] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2701.132786][T25057] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2701.138430][T25057] kernfs_fop_write+0x2b8/0x480 [ 2701.143267][T25057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.149497][T25057] __vfs_write+0x8a/0x110 [ 2701.153812][T25057] ? kernfs_fop_open+0xd80/0xd80 [ 2701.158736][T25057] vfs_write+0x268/0x5d0 [ 2701.162969][T25057] ksys_write+0x14f/0x290 [ 2701.167289][T25057] ? __ia32_sys_read+0xb0/0xb0 [ 2701.172044][T25057] ? do_syscall_64+0x26/0x760 [ 2701.176708][T25057] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2701.182818][T25057] ? do_syscall_64+0x26/0x760 [ 2701.187499][T25057] __x64_sys_write+0x73/0xb0 [ 2701.192083][T25057] do_syscall_64+0xfa/0x760 [ 2701.196577][T25057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2701.202463][T25057] RIP: 0033:0x459a59 [ 2701.206405][T25057] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2701.226010][T25057] RSP: 002b:00007fef0beecc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2701.234410][T25057] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2701.242370][T25057] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 2701.250338][T25057] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2701.258310][T25057] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef0beed6d4 [ 2701.266272][T25057] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2701.277272][T25057] memory: usage 6732kB, limit 0kB, failcnt 591 [ 2701.287941][T25057] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2701.295366][T25057] Memory cgroup stats for /syz4: [ 2701.295479][T25057] anon 4341760 [ 2701.295479][T25057] file 49152 [ 2701.295479][T25057] kernel_stack 65536 [ 2701.295479][T25057] slab 2555904 [ 2701.295479][T25057] sock 0 [ 2701.295479][T25057] shmem 221184 [ 2701.295479][T25057] file_mapped 0 [ 2701.295479][T25057] file_dirty 135168 [ 2701.295479][T25057] file_writeback 0 [ 2701.295479][T25057] anon_thp 4194304 [ 2701.295479][T25057] inactive_anon 135168 [ 2701.295479][T25057] active_anon 4341760 [ 2701.295479][T25057] inactive_file 16384 [ 2701.295479][T25057] active_file 12288 [ 2701.295479][T25057] unevictable 0 [ 2701.295479][T25057] slab_reclaimable 1486848 [ 2701.295479][T25057] slab_unreclaimable 1069056 [ 2701.295479][T25057] pgfault 259017 [ 2701.295479][T25057] pgmajfault 0 [ 2701.295479][T25057] workingset_refault 0 [ 2701.295479][T25057] workingset_activate 0 [ 2701.295479][T25057] workingset_nodereclaim 0 [ 2701.295479][T25057] pgrefill 1643 [ 2701.295479][T25057] pgscan 7112 [ 2701.295479][T25057] pgsteal 3188 [ 2701.391113][T25057] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25055,uid=0 [ 2701.407456][T25057] Memory cgroup out of memory: Killed process 25055 (syz-executor.4) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 2701.428400][T25058] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2701.432012][ T1071] oom_reaper: reaped process 25055 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2701.439370][T25058] CPU: 1 PID: 25058 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 2701.457566][T25058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2701.467623][T25058] Call Trace: [ 2701.470924][T25058] dump_stack+0x172/0x1f0 [ 2701.475266][T25058] dump_header+0x10b/0x82d [ 2701.479689][T25058] oom_kill_process.cold+0x10/0x15 [ 2701.484812][T25058] out_of_memory+0x334/0x1340 [ 2701.489502][T25058] ? oom_killer_disable+0x280/0x280 [ 2701.494730][T25058] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2701.500293][T25058] ? memcg_stat_show+0xc40/0xc40 [ 2701.505248][T25058] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2701.511073][T25058] ? cgroup_file_notify+0x140/0x1b0 [ 2701.516298][T25058] memory_max_write+0x262/0x3a0 [ 2701.521175][T25058] ? mem_cgroup_write+0x370/0x370 [ 2701.526216][T25058] ? cgroup_file_write+0x86/0x790 [ 2701.531255][T25058] cgroup_file_write+0x241/0x790 [ 2701.536209][T25058] ? mem_cgroup_write+0x370/0x370 [ 2701.541244][T25058] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2701.546891][T25058] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2701.552535][T25058] kernfs_fop_write+0x2b8/0x480 [ 2701.557392][T25058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.563644][T25058] __vfs_write+0x8a/0x110 [ 2701.567981][T25058] ? kernfs_fop_open+0xd80/0xd80 [ 2701.572931][T25058] vfs_write+0x268/0x5d0 [ 2701.577216][T25058] ksys_write+0x14f/0x290 [ 2701.581553][T25058] ? __ia32_sys_read+0xb0/0xb0 [ 2701.586321][T25058] ? do_syscall_64+0x26/0x760 [ 2701.591008][T25058] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2701.597079][T25058] ? do_syscall_64+0x26/0x760 [ 2701.601767][T25058] __x64_sys_write+0x73/0xb0 [ 2701.606367][T25058] do_syscall_64+0xfa/0x760 [ 2701.610887][T25058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2701.616787][T25058] RIP: 0033:0x459a59 [ 2701.620686][T25058] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2701.640297][T25058] RSP: 002b:00007fe71fdd7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2701.648701][T25058] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2701.656661][T25058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 2701.664623][T25058] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2701.672584][T25058] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe71fdd86d4 [ 2701.680542][T25058] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2701.712624][T25058] memory: usage 5772kB, limit 0kB, failcnt 105 [ 2701.718945][T25058] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2701.726453][T25058] Memory cgroup stats for /syz0: [ 2701.726572][T25058] anon 2187264 [ 2701.726572][T25058] file 151552 [ 2701.726572][T25058] kernel_stack 65536 [ 2701.726572][T25058] slab 3665920 [ 2701.726572][T25058] sock 0 [ 2701.726572][T25058] shmem 0 [ 2701.726572][T25058] file_mapped 0 [ 2701.726572][T25058] file_dirty 135168 [ 2701.726572][T25058] file_writeback 0 [ 2701.726572][T25058] anon_thp 2097152 [ 2701.726572][T25058] inactive_anon 0 [ 2701.726572][T25058] active_anon 2187264 [ 2701.726572][T25058] inactive_file 49152 [ 2701.726572][T25058] active_file 0 [ 2701.726572][T25058] unevictable 0 [ 2701.726572][T25058] slab_reclaimable 2568192 [ 2701.726572][T25058] slab_unreclaimable 1097728 [ 2701.726572][T25058] pgfault 192423 [ 2701.726572][T25058] pgmajfault 0 [ 2701.726572][T25058] workingset_refault 0 [ 2701.726572][T25058] workingset_activate 0 [ 2701.726572][T25058] workingset_nodereclaim 0 [ 2701.726572][T25058] pgrefill 35 [ 2701.726572][T25058] pgscan 365 [ 2701.726572][T25058] pgsteal 246 [ 2701.726572][T25058] pgactivate 66 [ 2701.823385][T25058] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=25056,uid=0 [ 2701.839011][T25058] Memory cgroup out of memory: Killed process 25058 (syz-executor.0) total-vm:72580kB, anon-rss:2184kB, file-rss:35876kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 2701.859207][ T1071] oom_reaper: reaped process 25058 (syz-executor.0), now anon-rss:0kB, file-rss:34916kB, shmem-rss:0kB [ 2701.863158][T25004] syz-executor.4 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=0 [ 2701.888021][T25004] CPU: 1 PID: 25004 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2701.896068][T25004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2701.906128][T25004] Call Trace: [ 2701.909502][T25004] dump_stack+0x172/0x1f0 [ 2701.913852][T25004] dump_header+0x10b/0x82d [ 2701.918274][T25004] ? oom_kill_process+0x94/0x3f0 [ 2701.923217][T25004] oom_kill_process.cold+0x10/0x15 [ 2701.928329][T25004] out_of_memory+0x334/0x1340 [ 2701.933012][T25004] ? lock_downgrade+0x920/0x920 [ 2701.937866][T25004] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2701.943677][T25004] ? oom_killer_disable+0x280/0x280 [ 2701.948883][T25004] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2701.954426][T25004] ? memcg_stat_show+0xc40/0xc40 [ 2701.959372][T25004] ? do_raw_spin_unlock+0x57/0x270 [ 2701.964484][T25004] ? _raw_spin_unlock+0x2d/0x50 [ 2701.969339][T25004] try_charge+0xf4b/0x1440 [ 2701.973790][T25004] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2701.979337][T25004] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2701.984884][T25004] ? cache_grow_begin+0x122/0xd20 [ 2701.989917][T25004] ? find_held_lock+0x35/0x130 [ 2701.994684][T25004] ? cache_grow_begin+0x122/0xd20 [ 2701.999715][T25004] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2702.005261][T25004] ? lock_downgrade+0x920/0x920 [ 2702.010109][T25004] ? memcg_kmem_put_cache+0x50/0x50 [ 2702.015310][T25004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.021555][T25004] ? __kasan_check_read+0x11/0x20 [ 2702.026584][T25004] cache_grow_begin+0x629/0xd20 [ 2702.031545][T25004] ? __sanitizer_cov_trace_cmp4+0x11/0x20 [ 2702.037265][T25004] ? mempolicy_slab_node+0x139/0x390 [ 2702.042549][T25004] fallback_alloc+0x1fd/0x2d0 [ 2702.047230][T25004] ____cache_alloc_node+0x1bc/0x1d0 [ 2702.052434][T25004] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2702.058679][T25004] kmem_cache_alloc+0x1ef/0x710 [ 2702.063533][T25004] ? stack_trace_save+0xac/0xe0 [ 2702.068386][T25004] __alloc_file+0x27/0x340 [ 2702.072805][T25004] alloc_empty_file+0x72/0x170 [ 2702.077571][T25004] path_openat+0xef/0x46d0 [ 2702.081995][T25004] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2702.087805][T25004] ? kasan_slab_alloc+0xf/0x20 [ 2702.092575][T25004] ? kmem_cache_alloc+0x121/0x710 [ 2702.097605][T25004] ? getname_flags+0xd6/0x5b0 [ 2702.102371][T25004] ? getname+0x1a/0x20 [ 2702.106440][T25004] ? do_sys_open+0x2c9/0x5d0 [ 2702.111030][T25004] ? __x64_sys_open+0x7e/0xc0 [ 2702.115714][T25004] ? __kasan_check_read+0x11/0x20 [ 2702.120742][T25004] ? mark_lock+0xc2/0x1220 [ 2702.125162][T25004] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2702.130723][T25004] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2702.136099][T25004] ? __alloc_fd+0x487/0x620 [ 2702.140605][T25004] do_filp_open+0x1a1/0x280 [ 2702.145106][T25004] ? may_open_dev+0x100/0x100 [ 2702.149783][T25004] ? lock_downgrade+0x920/0x920 [ 2702.154631][T25004] ? rwlock_bug.part.0+0x90/0x90 [ 2702.159576][T25004] ? __kasan_check_read+0x11/0x20 [ 2702.164598][T25004] ? do_raw_spin_unlock+0x57/0x270 [ 2702.169714][T25004] ? _raw_spin_unlock+0x2d/0x50 [ 2702.174560][T25004] ? __alloc_fd+0x487/0x620 [ 2702.179072][T25004] do_sys_open+0x3fe/0x5d0 [ 2702.183490][T25004] ? filp_open+0x80/0x80 [ 2702.187728][T25004] ? __detach_mounts+0x2a0/0x2a0 [ 2702.192669][T25004] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2702.198129][T25004] ? do_syscall_64+0x26/0x760 [ 2702.202801][T25004] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.208862][T25004] ? do_syscall_64+0x26/0x760 [ 2702.213547][T25004] __x64_sys_open+0x7e/0xc0 [ 2702.218057][T25004] do_syscall_64+0xfa/0x760 [ 2702.222566][T25004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.228450][T25004] RIP: 0033:0x4579d0 [ 2702.232343][T25004] Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 [ 2702.251950][T25004] RSP: 002b:00007ffeabf3d180 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 2702.260361][T25004] RAX: ffffffffffffffda RBX: 0000000000293671 RCX: 00000000004579d0 [ 2702.268327][T25004] RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007ffeabf3e360 05:55:41 executing program 0: socket$kcm(0x11, 0xa, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x2a1) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000400)=""/198, 0xc6}, {&(0x7f0000000500)=""/149, 0x95}, {&(0x7f00000005c0)=""/190, 0xbe}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f0000000100)=""/88, 0x58}], 0x5}, 0x20002) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="9bf465727920"], 0xfdef) 05:55:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x1ff) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:55:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x680d0000}, 0x0) 05:55:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x32e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:55:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x2a2, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:55:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) [ 2702.276294][T25004] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000138e940 [ 2702.284259][T25004] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffeabf3e360 [ 2702.292231][T25004] R13: 00007ffeabf3e350 R14: 0000000000000000 R15: 00007ffeabf3e360 [ 2702.302451][T25004] memory: usage 2356kB, limit 0kB, failcnt 603 [ 2702.308646][T25004] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2702.342846][T25004] Memory cgroup stats for /syz4: [ 2702.342958][T25004] anon 81920 [ 2702.342958][T25004] file 49152 [ 2702.342958][T25004] kernel_stack 0 [ 2702.342958][T25004] slab 2555904 [ 2702.342958][T25004] sock 0 [ 2702.342958][T25004] shmem 221184 [ 2702.342958][T25004] file_mapped 0 [ 2702.342958][T25004] file_dirty 135168 [ 2702.342958][T25004] file_writeback 0 [ 2702.342958][T25004] anon_thp 0 [ 2702.342958][T25004] inactive_anon 135168 [ 2702.342958][T25004] active_anon 81920 [ 2702.342958][T25004] inactive_file 16384 [ 2702.342958][T25004] active_file 12288 [ 2702.342958][T25004] unevictable 0 [ 2702.342958][T25004] slab_reclaimable 1486848 [ 2702.342958][T25004] slab_unreclaimable 1069056 [ 2702.342958][T25004] pgfault 259017 [ 2702.342958][T25004] pgmajfault 0 [ 2702.342958][T25004] workingset_refault 0 [ 2702.342958][T25004] workingset_activate 0 [ 2702.342958][T25004] workingset_nodereclaim 0 [ 2702.342958][T25004] pgrefill 1643 [ 2702.342958][T25004] pgscan 7112 [ 2702.342958][T25004] pgsteal 3188 [ 2702.342958][T25004] pgactivate 2838 [ 2702.442464][T25064] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:55:41 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x500007) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='memory.max\x00', 0x2, 0x0) [ 2702.492765][T25004] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25004,uid=0 [ 2702.516290][T25004] Memory cgroup out of memory: Killed process 25004 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 2702.553280][ T1071] oom_reaper: reaped process 25004 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 2702.565772][T25002] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2702.577670][T25002] CPU: 0 PID: 25002 Comm: syz-executor.0 Not tainted 5.4.0-rc1+ #0 [ 2702.585598][T25002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2702.595661][T25002] Call Trace: [ 2702.598970][T25002] dump_stack+0x172/0x1f0 [ 2702.603320][T25002] dump_header+0x10b/0x82d [ 2702.607750][T25002] ? oom_kill_process+0x94/0x3f0 [ 2702.612710][T25002] oom_kill_process.cold+0x10/0x15 [ 2702.617836][T25002] out_of_memory+0x334/0x1340 [ 2702.622518][T25002] ? lock_downgrade+0x920/0x920 [ 2702.627377][T25002] ? oom_killer_disable+0x280/0x280 [ 2702.632589][T25002] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2702.638132][T25002] ? memcg_stat_show+0xc40/0xc40 [ 2702.643071][T25002] ? do_raw_spin_unlock+0x57/0x270 [ 2702.648181][T25002] ? _raw_spin_unlock+0x2d/0x50 [ 2702.653038][T25002] try_charge+0xf4b/0x1440 [ 2702.657467][T25002] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2702.663007][T25002] ? percpu_ref_tryget_live+0x111/0x290 [ 2702.663028][T25002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.663046][T25002] ? __kasan_check_read+0x11/0x20 [ 2702.663069][T25002] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2702.674854][T25002] mem_cgroup_try_charge+0x136/0x590 [ 2702.674879][T25002] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2702.674897][T25002] wp_page_copy+0x407/0x1860 [ 2702.674915][T25002] ? find_held_lock+0x35/0x130 [ 2702.690713][T25002] ? do_wp_page+0x53b/0x15c0 [ 2702.690733][T25002] ? pmd_devmap_trans_unstable+0x220/0x220 [ 2702.690751][T25002] ? lock_downgrade+0x920/0x920 [ 2702.690769][T25002] ? swp_swapcount+0x540/0x540 [ 2702.690786][T25002] ? __kasan_check_read+0x11/0x20 [ 2702.700969][T25002] ? do_raw_spin_unlock+0x57/0x270 [ 2702.700989][T25002] do_wp_page+0x543/0x15c0 [ 2702.701013][T25002] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 2702.710395][T25002] __handle_mm_fault+0x23ec/0x4040 [ 2702.710417][T25002] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2702.710432][T25002] ? handle_mm_fault+0x292/0xaa0 [ 2702.710459][T25002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.710474][T25002] ? __kasan_check_read+0x11/0x20 [ 2702.710494][T25002] handle_mm_fault+0x3b7/0xaa0 [ 2702.725879][T25002] __do_page_fault+0x536/0xdd0 [ 2702.725905][T25002] do_page_fault+0x38/0x590 [ 2702.725929][T25002] page_fault+0x39/0x40 [ 2702.740426][T25002] RIP: 0033:0x430b36 [ 2702.756393][T25002] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 2702.756402][T25002] RSP: 002b:00007ffe6e1ac0a0 EFLAGS: 00010206 [ 2702.756414][T25002] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 2702.756423][T25002] RDX: 0000000001aeb930 RSI: 0000000001af3970 RDI: 0000000000000003 [ 2702.756432][T25002] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001aea940 [ 2702.756439][T25002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 2702.756450][T25002] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 2702.870082][T25002] memory: usage 3480kB, limit 0kB, failcnt 113 [ 2702.876277][T25002] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2702.919056][T25002] Memory cgroup stats for /syz0: [ 2702.919168][T25002] anon 102400 [ 2702.919168][T25002] file 151552 [ 2702.919168][T25002] kernel_stack 65536 [ 2702.919168][T25002] slab 3665920 [ 2702.919168][T25002] sock 0 [ 2702.919168][T25002] shmem 0 [ 2702.919168][T25002] file_mapped 0 [ 2702.919168][T25002] file_dirty 135168 [ 2702.919168][T25002] file_writeback 0 [ 2702.919168][T25002] anon_thp 0 [ 2702.919168][T25002] inactive_anon 0 [ 2702.919168][T25002] active_anon 102400 [ 2702.919168][T25002] inactive_file 49152 05:55:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 2702.919168][T25002] active_file 0 [ 2702.919168][T25002] unevictable 0 [ 2702.919168][T25002] slab_reclaimable 2568192 [ 2702.919168][T25002] slab_unreclaimable 1097728 [ 2702.919168][T25002] pgfault 192423 [ 2702.919168][T25002] pgmajfault 0 [ 2702.919168][T25002] workingset_refault 0 [ 2702.919168][T25002] workingset_activate 0 [ 2702.919168][T25002] workingset_nodereclaim 0 [ 2702.919168][T25002] pgrefill 35 [ 2702.919168][T25002] pgscan 365 [ 2702.919168][T25002] pgsteal 246 [ 2702.919168][T25002] pgactivate 66 [ 2703.048362][T25002] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=25002,uid=0 05:55:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) [ 2703.130075][T25002] Memory cgroup out of memory: Killed process 25002 (syz-executor.0) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 2703.166413][ T1071] oom_reaper: reaped process 25002 (syz-executor.0), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 05:55:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00\x1d\x8akURhM\xce\xe9\xc8\xa0rg\x1b\xafs\xcdJ\x95\xfd\xa1a\xdb?\x8b\x85p\x89\xe8#\xff\x98\xf5\r\xbdO\xf7\xf5\x88h\xc5\x98\xb9\xb8\xa5\xe9\xa5B\xc9\x8bX2\xb4:\xbcx\x8d]\xd3:8p&\xe1Tb\x93\xcbO2M\x0e\x8f++\f\x9cu\xcf\x02\xb7\xc6\x99\xa3\x10\x89\xd9\xb2E\x1c#\xd8\x8dW\xaeF\xc5\x05\xa0J\xc9r\xdb\xe9\x9du\x84\xd9\xf6\xe5O\x12z\xc8V\x97\x82\x0ezk^\xb4\xdc\xa8\xfd{\xdd\x93\xaauy\xf2J@R\xc0Z8\xf5j!>\xfaai\n0\x04\xce\xa2\x89\xb5\xccv\x9bX5\xc05e=\xf5\xf62I\x859U\x15C\xc0^\xde\xda\xd4\x10\xd5\x84A\xaf\xa5\xbc2f\xa0\xfa\xe5\xc9\xd5\xd4U\xc9\xbfzaw\x98m\x1dC\xd0\x81\xfa\xb9c\x19Q\xe0\xee\xbcr\x1e^\x19\xc6\xc7\x061\xfb\xd3v\x9a\xe0\xe5/t\t\xca\xf7\x13J\x16\x97{Bu\xd5\xef\xff()\x1e\xb2\xdbo6\x17^\xb3\xd3 \xaf\xde\x0e\xa0\x15X\r\xf3\x04\x97^L(\xc3\xab~\xf4\xdbq\x9e\xa4v\x95)H_\nZ{\xfbpJm\xa6t>1\x05\x00;\xcc\x0e~\xe2&`', 0x200002, 0x0) 05:55:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r1}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={r1, 0x8, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0x6, 0x8}, 0xc) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r2, 0x16, 0x1, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:55:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='memory.swap.max\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r1, &(0x7f0000000040)=0x2, 0x12) [ 2704.275322][T25065] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:55:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgrLH\xd4>\x1c\v;R]\"\'\x98\x16\xe0P\x99>\x961\x82\v\xda5\xdfS\xac3$\xd6\x1f\xa9p7\xb81i\xf0\xcc\xf2\xf9F\r\x01h\xb5Z\x19J\x16\xa1p\xcc\xae?\xa6=\r\xa9\xf6\x06\xd2\x88\xf2q\xaaA\x9d\x13\x04\xae\xa1\xb3\xae\xfb\x1e`\x18C\x84R\x99|Kd\x96ee\xaa\xe6S\xe0\xe5\xe9\xa4\xf7,\xa0n\xbd:\x19\xe0*q\x0e\x1d0=\x88\xb0vF70YSg\x96a\x95\xb5q\x1aM:\x8c\xe5\xc8*\x88b\xc6\xc3}\x89\xd96\xec\xca\xfe\xba\x8e\xb3cz\x13\xffE\x7f\x8fy$\xc2Y\xcfQ\x16\x8a\x7f\xda\x86\xdb\xe2\xef=\xc9\x06', 0x200002, 0x0) 05:55:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c050000}, 0x0) 05:55:43 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) [ 2704.695567][T25075] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2705.115401][T25069] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:55:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x33e30400) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) 05:55:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x29, 0x5, 0x0) r3 = socket$kcm(0x11, 0x10000000003, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000380)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x8, @rand_addr="8a01093d892587753de9db1e0c6758a1", 0x3}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="ae8ae6679b18c7c6", 0x8}], 0x1, &(0x7f0000000140)=[{0x108, 0x110, 0x1, "f07ca50c8ac385447e1a11a1acdc2698d2ae62f7a565d810581904daa4eb3d622bf8a107f0f5504506ca60afdd9463b91368ffbc000a36f0d044d142e8b3ee0c757a498e39c21b2440aec3ed1afc4c5f944c0b1da59344b7804cb1a35a8e46918da85f7fbf6926fd7d2f9b640f3571ddc53c9df24c5ab6b0729758e640208f356840aff9d22c5103aebb9a6edbce25c588fa06bc6e1eb006a760785bb8b44f13cb046342a930ada680aff20169a6e094ae2741de178433f94f30856cd1e40976bba6594a8ccac6f338241971f2d75de43c365936bcce1a89102d1ede1fffabb582851691da34977cd338ee2edf6aa43b27b2b1703e7cfb"}, {0x108, 0x184, 0xffffffff, "10014bb7af4fa432c340b674dc786f5b9bf8e16642899b6cba8865145c76bef1dc619a188c878377532184001756bb9c982a47fc6b5cd0c5f1d76ecff458d3c8529f20f00686157bedfc76783b2539de8e7424c7c695a416c8c1c242595a0548c34755c303887f91476316cd63407d16ca3f68d9bb515dd799f14a81e745829f851bdfb817a6ed135a30c27e16853a46de3f385bfd844971a4b2448449ed69773dcfe70483e6f1e0c1f6513120f0abf469c2bdb9e4f5def884a174c69227867a324d15d2950248f6c8e5a5cd4d0ce53136abbcc2d2108a19ddde15fe43145e38daf7f5b4421c2f11eb1f0706b99148243dbe9eda1d2034"}], 0x210}, 0x4) sendmsg$kcm(r2, &(0x7f00000008c0)={&(0x7f00000003c0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000440)="79469fde30e912671d9900e41a529f83ebab93ead0f5088df94206f2755c32f68752c46cddb99ed67ccfe3b96c60f3be5d53e80d6b6aa18203ffab7d5ca886c574a2bc3ce97624bae8be3215a1dd4b3068eec5e2bd3f051ebe5990c21d95a017b64fb416eb01f00781f27b726fc9ed22a1cb94fa89d47a51b7d9a05f878d022576fad1a805f0bd6229dc3121f78a818b5f112c826e6a56d0f08917a972995d22c91a66bbbec13f6712edde", 0xab}, {&(0x7f0000000500)="a6fc13b6917e5e09949e9f7a5de8dff1462a9ea1364fa1d8e4d26d62c464df3a70506cf66c43ddef834aafe93fefa5edb09f43c300c994d7d765ed4a55ff7aa7b21f45790f6551c7f645c2647c6c9801340be59d971e25b08fad1fd974c585fac719ca79f15461b500a44152317cb75240ce635650cf1282a679cc763dd58e1f8601fc26796618c6d2662c45c7f3bab818a30e0185ab4e21de7efb725a46753e0ec84e0f0f76c44f8a8030a6b00f773bf5d8b7eb661903413f1c7579f629ed65910b748714a6ee5ad1e4", 0xca}], 0x2, &(0x7f0000000640)=[{0x108, 0x110, 0x3, "ff4db577f0b82fd4ab54c9bb1a10996ac83317bc2e24f4684d4d8413dea374e68538ba116ea0e2e8da72187426f2ffac084226ac958d6351cc82bda200caebaf2087ab23dac03b27184c43aee812da02e55c2ebfd6d90234c73ef3375ed72e3a2e21a33a5bdea9b163a6959521bc856a089e6a8d73c4874c8f7948218e6fd74bf6954351a896b31854c4071b6fb775fc3aafd2c27d114ebd7baf0936fa8bdc7369bcb9368a766f3a562c5dee983c006599586c9bd2a0b40241921b07ebbb9b0312fc6c1ca5a4a40e53abdedc47eaffe1c583e8d838e728efb1ea880eedee4060d7b6a71a308aca6216bfe1834ad6360e0ccf395f7b6b"}, {0xc8, 0x63cb5d18a908dab8, 0x400, "420e282f064f174690c4b1ec988250b4226d15d85a71c96c7756f90f8f821bd5ef44c5d1b37db672d9c060b4eba3f613a231bd7789f22968283ddd019c0fc4192708fc2c3eee238936fa53c029723f84c43a48c92a3ec33e809117cbbf48860af0f7d18cb5529e0564e0459890ff122d520450430e8570affbdd7a47a96fb1576baab151f28c8cfeb30ccde0e09535beae9075a45e7f63a852be584de00c1c3487e1f1882dcb1bffa23e68ccf7b36ca376791b"}, {0x50, 0x6, 0x5, "ff46b6f0d11a5bb460d89417510c63fa58bfd198123ca5435e907c74650fb07072a2c14dfd6d22b6cab502ff4250f6607bf7f94bad421da3e42337d3"}, {0x38, 0x101, 0x456, "583ed79f0cb832f25d927a36c8e047a95d19cc3b12d2ca167ec30f69e354e623bf"}], 0x258}, 0x4000) setsockopt$sock_attach_bpf(r2, 0x107, 0x12, &(0x7f00000000c0)=r3, 0x4) socket$kcm(0x29, 0x0, 0x0) r5 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r5, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0x2, 0x4e20, 0x0, @empty}, 0x80, 0x0}, 0x0) 05:55:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70010000}, 0x0) 05:55:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'\x00\x00\x00\x00\xe0\x0e\x00\x00\x00\x00\x00\xd5L\xaci\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'gretap0\x00', 0x800}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r0, &(0x7f00000000c0), 0xfffffffffffffe68) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x300, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000040)=""/25) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 05:55:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000e00)=r1, 0x1e9) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r2, 0x8) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000680)=""/69, 0xffffffffffffff6c}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000ec0)=""/240, 0x19}], 0x7, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x2a3, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)={r3}) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0x14) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 2705.523520][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 2705.553797][T25151] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:55:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70020000}, 0x0) 05:55:45 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgrouv.cpu/syz1\x00', 0x200002, 0x0) [ 2706.191961][T25185] IPVS: ftp: loaded support on port[0] = 21 [ 2706.215380][T25153] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 05:55:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70030000}, 0x0) 05:55:45 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 05:55:45 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x2, 0x1, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3}, 0x20) openat$cgroup_int(r0, &(0x7f0000000100)='memory.swap.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x18400, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 05:55:45 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r5, r1, 0xd, 0x1}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r0, &(0x7f00000002c0)='memo\xb6w\xc0\x89ury.events\x00\xa6\xc9~\x8f\x86f@\xa9\xf5C\xd2\xe6\x92\x1f\x87\rMy\r\x1f\xc9A\xa0\xd9\x19t\x1f\"\x93\x8d_=\xae\xa1\x86\xea\xcb%ch\xc6\x93\x1c\xfd\t\xf9\x97\xd1\xc1r\xcfV\x94^\xefzA\xf5\x85cY,`', 0x0, 0x0) [ 2706.942894][T25149] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2707.303946][T25230] IPVS: ftp: loaded support on port[0] = 21 [ 2707.340978][T25167] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2707.765171][T25185] chnl_net:caif_netlink_parms(): no params data found [ 2707.928569][T25185] bridge0: port 1(bridge_slave_0) entered blocking state [ 2707.937578][T25185] bridge0: port 1(bridge_slave_0) entered disabled state [ 2707.947250][T25185] device bridge_slave_0 entered promiscuous mode [ 2708.038328][T25230] chnl_net:caif_netlink_parms(): no params data found [ 2708.051008][T25185] bridge0: port 2(bridge_slave_1) entered blocking state [ 2708.058084][T25185] bridge0: port 2(bridge_slave_1) entered disabled state [ 2708.067817][T25185] device bridge_slave_1 entered promiscuous mode [ 2708.174389][T25185] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2708.202464][T25185] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2708.354758][T25230] bridge0: port 1(bridge_slave_0) entered blocking state [ 2708.362022][T25230] bridge0: port 1(bridge_slave_0) entered disabled state [ 2708.371929][T25230] device bridge_slave_0 entered promiscuous mode [ 2708.383526][T25185] team0: Port device team_slave_0 added [ 2708.435534][T25230] bridge0: port 2(bridge_slave_1) entered blocking state [ 2708.442838][T25230] bridge0: port 2(bridge_slave_1) entered disabled state [ 2708.453369][T25230] device bridge_slave_1 entered promiscuous mode [ 2708.463797][T25185] team0: Port device team_slave_1 added [ 2708.590756][T25230] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2708.618875][T25230] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2708.724110][T25185] device hsr_slave_0 entered promiscuous mode [ 2708.791383][T25185] device hsr_slave_1 entered promiscuous mode [ 2708.989945][T25185] debugfs: Directory 'hsr0' with parent '/' already present! [ 2709.001404][T25230] team0: Port device team_slave_0 added [ 2709.073903][T25230] team0: Port device team_slave_1 added [ 2709.174526][T25230] device hsr_slave_0 entered promiscuous mode [ 2709.241350][T25230] device hsr_slave_1 entered promiscuous mode [ 2709.319998][T25230] debugfs: Directory 'hsr0' with parent '/' already present! [ 2709.620482][T25185] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2709.787860][T25185] 8021q: adding VLAN 0 to HW filter on device team0 [ 2709.803738][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2709.812819][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2709.875784][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2709.885970][T24823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2709.895546][T24823] bridge0: port 1(bridge_slave_0) entered blocking state [ 2709.902687][T24823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2709.913532][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2709.984908][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2709.995735][T24824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2710.005139][T24824] bridge0: port 2(bridge_slave_1) entered blocking state [ 2710.012253][T24824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2710.050934][T25230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2710.105246][T24820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2710.129694][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2710.142015][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2710.151467][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2710.245703][T25230] 8021q: adding VLAN 0 to HW filter on device team0 [ 2710.262023][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2710.272922][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2710.366431][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2710.376217][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2710.386282][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2710.396389][T24810] bridge0: port 1(bridge_slave_0) entered blocking state [ 2710.403520][T24810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2710.412701][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2710.423359][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2710.433236][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2710.443426][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2710.472574][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2710.482022][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2710.492028][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2710.501708][T24808] bridge0: port 2(bridge_slave_1) entered blocking state [ 2710.508770][T24808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2710.518168][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2710.527969][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2710.600705][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2710.614472][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2710.706630][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2710.742625][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2710.752989][T24808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2710.817180][T25185] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2710.826198][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2710.836501][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2710.847457][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2710.930025][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2710.939553][T24813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2710.963221][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2710.981719][T24810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2710.997136][T25230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2711.078167][ T32] device bridge_slave_1 left promiscuous mode [ 2711.087769][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2711.153076][ T32] device bridge_slave_0 left promiscuous mode [ 2711.166430][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2711.201378][T25240] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2711.213492][ T32] device bridge_slave_1 left promiscuous mode [ 2711.213985][T25240] CPU: 0 PID: 25240 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2711.223722][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2711.227480][T25240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2711.227489][T25240] Call Trace: [ 2711.227512][T25240] dump_stack+0x172/0x1f0 [ 2711.227539][T25240] dump_header+0x10b/0x82d [ 2711.256886][T25240] oom_kill_process.cold+0x10/0x15 [ 2711.262034][T25240] out_of_memory+0x334/0x1340 [ 2711.266745][T25240] ? cgroup_file_notify+0x140/0x1b0 [ 2711.271964][T25240] ? oom_killer_disable+0x280/0x280 [ 2711.277172][T25240] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2711.282709][T25240] ? memcg_stat_show+0xc40/0xc40 [ 2711.287650][T25240] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2711.293450][T25240] ? cgroup_file_notify+0x140/0x1b0 [ 2711.298645][T25240] memory_max_write+0x262/0x3a0 [ 2711.303494][T25240] ? mem_cgroup_write+0x370/0x370 [ 2711.308509][T25240] ? lock_acquire+0x190/0x410 [ 2711.313180][T25240] ? kernfs_fop_write+0x227/0x480 [ 2711.318205][T25240] cgroup_file_write+0x241/0x790 [ 2711.323135][T25240] ? mem_cgroup_write+0x370/0x370 [ 2711.328153][T25240] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2711.333807][T25240] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2711.339431][T25240] kernfs_fop_write+0x2b8/0x480 [ 2711.344272][T25240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2711.350507][T25240] __vfs_write+0x8a/0x110 [ 2711.354826][T25240] ? kernfs_fop_open+0xd80/0xd80 [ 2711.359770][T25240] vfs_write+0x268/0x5d0 [ 2711.364010][T25240] ksys_write+0x14f/0x290 [ 2711.368332][T25240] ? __ia32_sys_read+0xb0/0xb0 [ 2711.373094][T25240] ? do_syscall_64+0x26/0x760 [ 2711.377762][T25240] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2711.383817][T25240] ? do_syscall_64+0x26/0x760 [ 2711.388493][T25240] __x64_sys_write+0x73/0xb0 [ 2711.393080][T25240] do_syscall_64+0xfa/0x760 [ 2711.397578][T25240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2711.403458][T25240] RIP: 0033:0x459a59 [ 2711.407343][T25240] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2711.426950][T25240] RSP: 002b:00007f13ef1c4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2711.435347][T25240] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2711.443311][T25240] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000c [ 2711.451272][T25240] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2711.459229][T25240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13ef1c56d4 [ 2711.467191][T25240] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 2711.483277][T25240] memory: usage 6752kB, limit 0kB, failcnt 606 [ 2711.489564][T25240] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2711.497256][T25240] Memory cgroup stats for /syz4: [ 2711.497365][T25240] anon 4366336 [ 2711.497365][T25240] file 49152 [ 2711.497365][T25240] kernel_stack 65536 [ 2711.497365][T25240] slab 2416640 [ 2711.497365][T25240] sock 0 [ 2711.497365][T25240] shmem 221184 [ 2711.497365][T25240] file_mapped 0 [ 2711.497365][T25240] file_dirty 135168 [ 2711.497365][T25240] file_writeback 0 [ 2711.497365][T25240] anon_thp 4194304 [ 2711.497365][T25240] inactive_anon 135168 [ 2711.497365][T25240] active_anon 4366336 [ 2711.497365][T25240] inactive_file 16384 [ 2711.497365][T25240] active_file 12288 [ 2711.497365][T25240] unevictable 0 [ 2711.497365][T25240] slab_reclaimable 1486848 [ 2711.497365][T25240] slab_unreclaimable 929792 [ 2711.497365][T25240] pgfault 259083 [ 2711.497365][T25240] pgmajfault 0 [ 2711.497365][T25240] workingset_refault 0 [ 2711.497365][T25240] workingset_activate 0 [ 2711.497365][T25240] workingset_nodereclaim 0 [ 2711.497365][T25240] pgrefill 1643 [ 2711.497365][T25240] pgscan 7112 [ 2711.497365][T25240] pgsteal 3188 [ 2711.592419][T25240] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25239,uid=0 [ 2711.608598][T25240] Memory cgroup out of memory: Killed process 25239 (syz-executor.4) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 2711.629960][ T32] device bridge_slave_0 left promiscuous mode [ 2711.636172][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2711.648401][ T1071] oom_reaper: reaped process 25239 (syz-executor.4), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 2711.683482][ T32] device bridge_slave_1 left promiscuous mode [ 2711.689711][ T32] bridge0: port 2(bridge_slave_1) entered disabled state 05:55:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) write$cgroup_int(r3, 0x0, 0x0) 05:55:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000503ed0080637e6394f20100d2000500fcb711407f480f0017010300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70040000}, 0x0) [ 2711.741808][ T32] device bridge_slave_0 left promiscuous mode [ 2711.747794][T25185] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2711.748223][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2711.777910][T25185] CPU: 0 PID: 25185 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 2711.785843][T25185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2711.795900][T25185] Call Trace: [ 2711.799192][T25185] dump_stack+0x172/0x1f0 [ 2711.803530][T25185] dump_header+0x10b/0x82d [ 2711.807940][T25185] ? oom_kill_process+0x94/0x3f0 [ 2711.812888][T25185] oom_kill_process.cold+0x10/0x15 [ 2711.817999][T25185] out_of_memory+0x334/0x1340 [ 2711.822684][T25185] ? lock_downgrade+0x920/0x920 [ 2711.827540][T25185] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2711.833342][T25185] ? oom_killer_disable+0x280/0x280 [ 2711.838658][T25185] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2711.844218][T25185] ? memcg_stat_show+0xc40/0xc40 [ 2711.849186][T25185] ? do_raw_spin_unlock+0x57/0x270 [ 2711.854315][T25185] ? _raw_spin_unlock+0x2d/0x50 [ 2711.859171][T25185] try_charge+0xf4b/0x1440 [ 2711.863608][T25185] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2711.869157][T25185] ? percpu_ref_tryget_live+0x111/0x290 [ 2711.874712][T25185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2711.880954][T25185] ? __kasan_check_read+0x11/0x20 [ 2711.885981][T25185] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2711.891544][T25185] mem_cgroup_try_charge+0x136/0x590 [ 2711.896845][T25185] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2711.902481][T25185] wp_page_copy+0x407/0x1860 [ 2711.907071][T25185] ? find_held_lock+0x35/0x130 [ 2711.911853][T25185] ? do_wp_page+0x53b/0x15c0 [ 2711.916448][T25185] ? pmd_devmap_trans_unstable+0x220/0x220 [ 2711.922258][T25185] ? lock_downgrade+0x920/0x920 [ 2711.927379][T25185] ? swp_swapcount+0x540/0x540 [ 2711.932146][T25185] ? __kasan_check_read+0x11/0x20 [ 2711.937170][T25185] ? do_raw_spin_unlock+0x57/0x270 [ 2711.942292][T25185] do_wp_page+0x543/0x15c0 [ 2711.946715][T25185] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 2711.952094][T25185] __handle_mm_fault+0x23ec/0x4040 [ 2711.957206][T25185] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2711.962752][T25185] ? handle_mm_fault+0x292/0xaa0 [ 2711.967705][T25185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2711.973950][T25185] ? __kasan_check_read+0x11/0x20 [ 2711.978982][T25185] handle_mm_fault+0x3b7/0xaa0 [ 2711.983749][T25185] __do_page_fault+0x536/0xdd0 [ 2711.988532][T25185] do_page_fault+0x38/0x590 [ 2711.993067][T25185] page_fault+0x39/0x40 [ 2711.997216][T25185] RIP: 0033:0x430b36 [ 2712.001105][T25185] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 2712.020714][T25185] RSP: 002b:00007fff4f342820 EFLAGS: 00010206 [ 2712.026775][T25185] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 2712.034742][T25185] RDX: 0000000001822930 RSI: 000000000182a970 RDI: 0000000000000003 [ 2712.042709][T25185] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001821940 [ 2712.050681][T25185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 2712.058655][T25185] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 2712.070910][T25185] memory: usage 2368kB, limit 0kB, failcnt 618 [ 2712.077153][T25185] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2712.084139][T25185] Memory cgroup stats for /syz4: [ 2712.084248][T25185] anon 102400 [ 2712.084248][T25185] file 49152 [ 2712.084248][T25185] kernel_stack 0 [ 2712.084248][T25185] slab 2416640 [ 2712.084248][T25185] sock 0 [ 2712.084248][T25185] shmem 221184 [ 2712.084248][T25185] file_mapped 0 [ 2712.084248][T25185] file_dirty 135168 [ 2712.084248][T25185] file_writeback 0 [ 2712.084248][T25185] anon_thp 0 [ 2712.084248][T25185] inactive_anon 135168 [ 2712.084248][T25185] active_anon 102400 [ 2712.084248][T25185] inactive_file 16384 [ 2712.084248][T25185] active_file 12288 [ 2712.084248][T25185] unevictable 0 [ 2712.084248][T25185] slab_reclaimable 1486848 [ 2712.084248][T25185] slab_unreclaimable 929792 [ 2712.084248][T25185] pgfault 259083 [ 2712.084248][T25185] pgmajfault 0 [ 2712.084248][T25185] workingset_refault 0 [ 2712.084248][T25185] workingset_activate 0 [ 2712.084248][T25185] workingset_nodereclaim 0 [ 2712.084248][T25185] pgrefill 1643 [ 2712.084248][T25185] pgscan 7112 [ 2712.084248][T25185] pgsteal 3188 [ 2712.084248][T25185] pgactivate 2838 [ 2712.184317][ T32] device bridge_slave_1 left promiscuous mode [ 2712.190555][T25185] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25185,uid=0 [ 2712.207147][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2712.215446][T25185] Memory cgroup out of memory: Killed process 25185 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 2712.234047][ T1071] oom_reaper: reaped process 25185 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2712.262081][ T32] device bridge_slave_0 left promiscuous mode [ 2712.269620][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2712.323733][ T32] device bridge_slave_1 left promiscuous mode [ 2712.331983][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2712.472433][ T32] device bridge_slave_0 left promiscuous mode [ 2712.478773][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2712.534204][ T32] device bridge_slave_1 left promiscuous mode [ 2712.541267][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2712.622269][ T32] device bridge_slave_0 left promiscuous mode [ 2712.629108][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2712.703427][ T32] device bridge_slave_1 left promiscuous mode [ 2712.709810][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2712.812214][ T32] device bridge_slave_0 left promiscuous mode [ 2712.818525][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2712.883391][ T32] device bridge_slave_1 left promiscuous mode [ 2712.889726][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2713.012213][ T32] device bridge_slave_0 left promiscuous mode [ 2713.018593][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2713.083405][ T32] device bridge_slave_1 left promiscuous mode [ 2713.089747][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2713.144748][ T32] device bridge_slave_0 left promiscuous mode [ 2713.151769][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2713.233532][ T32] device bridge_slave_1 left promiscuous mode [ 2713.240173][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2713.292214][ T32] device bridge_slave_0 left promiscuous mode [ 2713.298527][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2713.343703][ T32] device bridge_slave_1 left promiscuous mode [ 2713.350592][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2713.501919][ T32] device bridge_slave_0 left promiscuous mode [ 2713.508236][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2713.563284][ T32] device bridge_slave_1 left promiscuous mode [ 2713.569612][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2713.622273][ T32] device bridge_slave_0 left promiscuous mode [ 2713.628599][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2713.673671][ T32] device bridge_slave_1 left promiscuous mode [ 2713.680796][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2713.752138][ T32] device bridge_slave_0 left promiscuous mode [ 2713.758451][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2713.813728][ T32] device bridge_slave_1 left promiscuous mode [ 2713.820723][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2713.922559][ T32] device bridge_slave_0 left promiscuous mode [ 2713.928902][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2714.013341][ T32] device bridge_slave_1 left promiscuous mode [ 2714.019678][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2714.102163][ T32] device bridge_slave_0 left promiscuous mode [ 2714.108497][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2714.163503][ T32] device bridge_slave_1 left promiscuous mode [ 2714.170576][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2714.302504][ T32] device bridge_slave_0 left promiscuous mode [ 2714.308837][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2714.374097][ T32] device bridge_slave_1 left promiscuous mode [ 2714.381205][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2714.442166][ T32] device bridge_slave_0 left promiscuous mode [ 2714.448509][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2714.543540][ T32] device bridge_slave_1 left promiscuous mode [ 2714.550622][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2714.633818][ T32] device bridge_slave_0 left promiscuous mode [ 2714.640312][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2714.694035][ T32] device bridge_slave_1 left promiscuous mode [ 2714.702137][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2714.752908][ T32] device bridge_slave_0 left promiscuous mode [ 2714.759251][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2714.834256][ T32] device bridge_slave_1 left promiscuous mode [ 2714.841401][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2714.882150][ T32] device bridge_slave_0 left promiscuous mode [ 2714.888482][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2714.964033][ T32] device bridge_slave_1 left promiscuous mode [ 2714.971218][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2715.062063][ T32] device bridge_slave_0 left promiscuous mode [ 2715.068306][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2715.153160][ T32] device bridge_slave_1 left promiscuous mode [ 2715.159390][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2715.261986][ T32] device bridge_slave_0 left promiscuous mode [ 2715.268235][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2715.334368][ T32] device bridge_slave_1 left promiscuous mode [ 2715.341567][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2715.461810][ T32] device bridge_slave_0 left promiscuous mode [ 2715.468047][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2715.553148][ T32] device bridge_slave_1 left promiscuous mode [ 2715.559414][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2715.621882][ T32] device bridge_slave_0 left promiscuous mode [ 2715.628224][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2715.675904][ T32] device bridge_slave_1 left promiscuous mode [ 2715.682235][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2715.771830][ T32] device bridge_slave_0 left promiscuous mode [ 2715.778062][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2715.863093][ T32] device bridge_slave_1 left promiscuous mode [ 2715.869316][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2715.942005][ T32] device bridge_slave_0 left promiscuous mode [ 2715.948264][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2716.073028][ T32] device bridge_slave_1 left promiscuous mode [ 2716.079256][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2716.141896][ T32] device bridge_slave_0 left promiscuous mode [ 2716.148142][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2716.223589][ T32] device bridge_slave_1 left promiscuous mode [ 2716.230575][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2716.381790][ T32] device bridge_slave_0 left promiscuous mode [ 2716.388014][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2716.443307][ T32] device bridge_slave_1 left promiscuous mode [ 2716.449558][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2716.542039][ T32] device bridge_slave_0 left promiscuous mode [ 2716.548295][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2716.603161][ T32] device bridge_slave_1 left promiscuous mode [ 2716.609442][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2716.661892][ T32] device bridge_slave_0 left promiscuous mode [ 2716.668153][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2716.713096][ T32] device bridge_slave_1 left promiscuous mode [ 2716.719587][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2716.781740][ T32] device bridge_slave_0 left promiscuous mode [ 2716.788009][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2716.863572][ T32] device bridge_slave_1 left promiscuous mode [ 2716.870598][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2716.932146][ T32] device bridge_slave_0 left promiscuous mode [ 2716.938385][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2717.113072][ T32] device bridge_slave_1 left promiscuous mode [ 2717.119312][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2717.231863][ T32] device bridge_slave_0 left promiscuous mode [ 2717.238107][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2717.313179][ T32] device bridge_slave_1 left promiscuous mode [ 2717.319443][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2717.371758][ T32] device bridge_slave_0 left promiscuous mode [ 2717.378008][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2717.433020][ T32] device bridge_slave_1 left promiscuous mode [ 2717.439260][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2717.501656][ T32] device bridge_slave_0 left promiscuous mode [ 2717.507898][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2717.563136][ T32] device bridge_slave_1 left promiscuous mode [ 2717.569375][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2717.701945][ T32] device bridge_slave_0 left promiscuous mode [ 2717.708209][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2717.763175][ T32] device bridge_slave_1 left promiscuous mode [ 2717.769436][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2717.831736][ T32] device bridge_slave_0 left promiscuous mode [ 2717.837990][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2717.923061][ T32] device bridge_slave_1 left promiscuous mode [ 2717.929304][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2718.011666][ T32] device bridge_slave_0 left promiscuous mode [ 2718.017901][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2718.093026][ T32] device bridge_slave_1 left promiscuous mode [ 2718.099255][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2718.161600][ T32] device bridge_slave_0 left promiscuous mode [ 2718.167826][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2718.244877][ T32] device bridge_slave_1 left promiscuous mode [ 2718.252107][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2718.311716][ T32] device bridge_slave_0 left promiscuous mode [ 2718.318042][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2718.373035][ T32] device bridge_slave_1 left promiscuous mode [ 2718.379260][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2718.471717][ T32] device bridge_slave_0 left promiscuous mode [ 2718.477958][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2718.542858][ T32] device bridge_slave_1 left promiscuous mode [ 2718.549082][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2718.601889][ T32] device bridge_slave_0 left promiscuous mode [ 2718.608634][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2718.672975][ T32] device bridge_slave_1 left promiscuous mode [ 2718.679203][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2718.731708][ T32] device bridge_slave_0 left promiscuous mode [ 2718.737972][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2718.872964][ T32] device bridge_slave_1 left promiscuous mode [ 2718.879189][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2718.932067][ T32] device bridge_slave_0 left promiscuous mode [ 2718.938287][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2719.012989][ T32] device bridge_slave_1 left promiscuous mode [ 2719.019219][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2719.071756][ T32] device bridge_slave_0 left promiscuous mode [ 2719.077993][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2719.173103][ T32] device bridge_slave_1 left promiscuous mode [ 2719.179343][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2719.221736][ T32] device bridge_slave_0 left promiscuous mode [ 2719.227975][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2719.303014][ T32] device bridge_slave_1 left promiscuous mode [ 2719.309248][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2719.361735][ T32] device bridge_slave_0 left promiscuous mode [ 2719.367972][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2719.493139][ T32] device bridge_slave_1 left promiscuous mode [ 2719.499367][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2719.641607][ T32] device bridge_slave_0 left promiscuous mode [ 2719.647848][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2719.692959][ T32] device bridge_slave_1 left promiscuous mode [ 2719.699188][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2719.751987][ T32] device bridge_slave_0 left promiscuous mode [ 2719.758250][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2719.833059][ T32] device bridge_slave_1 left promiscuous mode [ 2719.839308][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2719.901649][ T32] device bridge_slave_0 left promiscuous mode [ 2719.907916][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2720.002988][ T32] device bridge_slave_1 left promiscuous mode [ 2720.009240][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2720.101767][ T32] device bridge_slave_0 left promiscuous mode [ 2720.108018][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2720.163660][ T32] device bridge_slave_1 left promiscuous mode [ 2720.170671][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2720.271463][ T32] device bridge_slave_0 left promiscuous mode [ 2720.277697][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2720.332961][ T32] device bridge_slave_1 left promiscuous mode [ 2720.339195][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 2720.391597][ T32] device bridge_slave_0 left promiscuous mode [ 2720.397835][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 2857.620493][ T32] device hsr_slave_0 left promiscuous mode [ 2857.660422][ T32] device hsr_slave_1 left promiscuous mode [ 2857.728451][ T32] team0 (unregistering): Port device team_slave_1 removed [ 2857.746190][ T32] team0 (unregistering): Port device team_slave_0 removed [ 2857.764175][ T32] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2857.863813][ T32] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2858.035847][ T32] bond0 (unregistering): Released all slaves [ 2858.170811][ T32] device hsr_slave_0 left promiscuous mode [ 2858.210380][ T32] device hsr_slave_1 left promiscuous mode [ 2858.272915][ T32] team0 (unregistering): Port device team_slave_1 removed [ 2858.289126][ T32] team0 (unregistering): Port device team_slave_0 removed [ 2858.311639][ T32] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2858.359542][ T32] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2858.538873][ T32] bond0 (unregistering): Released all slaves [ 2858.740775][ T32] device hsr_slave_0 left promiscuous mode [ 2858.780969][ T32] device hsr_slave_1 left promiscuous mode [ 2858.842782][ T32] team0 (unregistering): Port device team_slave_1 removed [ 2858.867186][ T32] team0 (unregistering): Port device team_slave_0 removed [ 2858.885110][ T32] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2858.984827][ T32] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2859.236325][ T32] bond0 (unregistering): Released all slaves [ 2859.490388][ T32] device hsr_slave_0 left promiscuous mode [ 2859.570388][ T32] device hsr_slave_1 left promiscuous mode [ 2859.642461][ T32] team0 (unregistering): Port device team_slave_1 removed [ 2859.662048][ T32] team0 (unregistering): Port device team_slave_0 removed [ 2859.683744][ T32] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2859.769383][ T32] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2859.922677][ T32] bond0 (unregistering): Released all slaves [ 2860.140749][ T32] device hsr_slave_0 left promiscuous mode [ 2860.230397][ T32] device hsr_slave_1 left promiscuous mode [ 2860.290055][ T1070] INFO: task kworker/1:7:24808 blocked for more than 143 seconds. [ 2860.297900][ T1070] Not tainted 5.4.0-rc1+ #0 [ 2860.303364][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2860.312338][ T32] kobject: 'rx-0' (000000003f8a5ebf): kobject_cleanup, parent 00000000ceb147cf [ 2860.321541][ T1070] kworker/1:7 D27112 24808 2 0x80004000 [ 2860.327976][ T1070] Workqueue: events linkwatch_event [ 2860.333608][ T32] kobject: 'rx-0' (000000003f8a5ebf): auto cleanup 'remove' event [ 2860.341782][ T32] kobject: 'rx-0' (000000003f8a5ebf): kobject_uevent_env [ 2860.348974][ T32] kobject: 'rx-0' (000000003f8a5ebf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2860.360207][ T1070] Call Trace: [ 2860.363521][ T1070] __schedule+0x94f/0x1e70 [ 2860.367939][ T1070] ? __sched_text_start+0x8/0x8 [ 2860.373664][ T1070] ? __kasan_check_read+0x11/0x20 [ 2860.378703][ T1070] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2860.384324][ T32] kobject: 'rx-0' (000000003f8a5ebf): auto cleanup kobject_del [ 2860.392275][ T32] kobject: 'rx-0' (000000003f8a5ebf): calling ktype release [ 2860.399553][ T32] kobject: 'rx-0': free name [ 2860.404563][ T1070] schedule+0xd9/0x260 [ 2860.408642][ T1070] schedule_preempt_disabled+0x13/0x20 [ 2860.414452][ T1070] __mutex_lock+0x7b0/0x13c0 [ 2860.419048][ T1070] ? rtnl_lock+0x17/0x20 [ 2860.423691][ T1070] ? mutex_trylock+0x2d0/0x2d0 [ 2860.428467][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2860.430031][ T32] kobject: 'tx-0' (000000000e6126d3): kobject_cleanup, parent 00000000ceb147cf [ 2860.435098][ T1070] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2860.450294][ T1070] mutex_lock_nested+0x16/0x20 [ 2860.455059][ T1070] ? mutex_lock_nested+0x16/0x20 [ 2860.459875][ T32] kobject: 'tx-0' (000000000e6126d3): auto cleanup 'remove' event [ 2860.460381][ T1070] rtnl_lock+0x17/0x20 [ 2860.467782][ T32] kobject: 'tx-0' (000000000e6126d3): kobject_uevent_env [ 2860.472240][ T1070] linkwatch_event+0xf/0x70 [ 2860.484012][ T1070] process_one_work+0x9af/0x1740 [ 2860.488965][ T1070] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2860.489848][ T32] kobject: 'tx-0' (000000000e6126d3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2860.505202][ T1070] ? lock_acquire+0x190/0x410 [ 2860.505248][ T1070] worker_thread+0x98/0xe40 [ 2860.505321][ T1070] kthread+0x361/0x430 [ 2860.505349][ T1070] ? process_one_work+0x1740/0x1740 [ 2860.505376][ T1070] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2860.505400][ T1070] ret_from_fork+0x24/0x30 [ 2860.511333][ T32] kobject: 'tx-0' (000000000e6126d3): auto cleanup kobject_del [ 2860.514751][ T1070] INFO: task kworker/1:8:24810 blocked for more than 143 seconds. [ 2860.518799][ T32] kobject: 'tx-0' (000000000e6126d3): calling ktype release [ 2860.539857][ T1070] Not tainted 5.4.0-rc1+ #0 [ 2860.542674][ T32] kobject: 'tx-0': free name [ 2860.559810][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2860.562716][ T32] kobject: 'queues' (00000000ceb147cf): kobject_cleanup, parent 00000000a93730df [ 2860.566870][ T1070] kworker/1:8 D27000 24810 2 0x80004000 [ 2860.575905][ T32] kobject: 'queues' (00000000ceb147cf): calling ktype release [ 2860.598999][ T32] kobject: 'queues' (00000000ceb147cf): kset_release [ 2860.606010][ T32] kobject: 'queues': free name [ 2860.610182][ T1070] Workqueue: events switchdev_deferred_process_work [ 2860.611727][ T32] kobject: 'hsr0' (000000001431b7a3): kobject_uevent_env [ 2860.617352][ T1070] Call Trace: [ 2860.624814][ T32] kobject: 'hsr0' (000000001431b7a3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2860.639080][ T1070] __schedule+0x94f/0x1e70 [ 2860.643272][ T32] kobject: 'batman_adv' (00000000e4c2cb7e): kobject_uevent_env [ 2860.649904][ T1070] ? __sched_text_start+0x8/0x8 [ 2860.655896][ T1070] ? __kasan_check_read+0x11/0x20 [ 2860.659791][ T32] kobject: 'batman_adv' (00000000e4c2cb7e): kobject_uevent_env: filter function caused the event to drop! [ 2860.661192][ T1070] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2860.672680][ T32] kobject: 'batman_adv' (00000000e4c2cb7e): kobject_cleanup, parent 00000000a93730df [ 2860.687162][ T32] kobject: 'batman_adv' (00000000e4c2cb7e): calling ktype release [ 2860.689856][ T1070] schedule+0xd9/0x260 [ 2860.695889][ T32] kobject: (00000000e4c2cb7e): dynamic_kobj_release [ 2860.705936][ T32] kobject: 'batman_adv': free name [ 2860.709850][ T1070] schedule_preempt_disabled+0x13/0x20 [ 2860.711694][ T32] kobject: 'rx-0' (000000004d9ccdc8): kobject_cleanup, parent 00000000ab3702fa [ 2860.716544][ T1070] __mutex_lock+0x7b0/0x13c0 [ 2860.730378][ T32] kobject: 'rx-0' (000000004d9ccdc8): auto cleanup 'remove' event [ 2860.738283][ T1070] ? rtnl_lock+0x17/0x20 [ 2860.742593][ T1070] ? mutex_trylock+0x2d0/0x2d0 [ 2860.747377][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2860.753695][ T32] kobject: 'rx-0' (000000004d9ccdc8): kobject_uevent_env [ 2860.760782][ T32] kobject: 'rx-0' (000000004d9ccdc8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2860.771798][ T1070] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2860.777974][ T1070] mutex_lock_nested+0x16/0x20 [ 2860.782808][ T32] kobject: 'rx-0' (000000004d9ccdc8): auto cleanup kobject_del [ 2860.790423][ T1070] ? mutex_lock_nested+0x16/0x20 [ 2860.795362][ T1070] rtnl_lock+0x17/0x20 [ 2860.799431][ T1070] switchdev_deferred_process_work+0xe/0x20 [ 2860.800019][ T32] kobject: 'rx-0' (000000004d9ccdc8): calling ktype release [ 2860.813901][ T32] kobject: 'rx-0': free name [ 2860.818578][ T32] kobject: 'tx-0' (00000000381d7b9a): kobject_cleanup, parent 00000000ab3702fa [ 2860.819863][ T1070] process_one_work+0x9af/0x1740 [ 2860.827998][ T32] kobject: 'tx-0' (00000000381d7b9a): auto cleanup 'remove' event [ 2860.840784][ T32] kobject: 'tx-0' (00000000381d7b9a): kobject_uevent_env [ 2860.847806][ T32] kobject: 'tx-0' (00000000381d7b9a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2860.849893][ T1070] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2860.858974][ T32] kobject: 'tx-0' (00000000381d7b9a): auto cleanup kobject_del [ 2860.871966][ T32] kobject: 'tx-0' (00000000381d7b9a): calling ktype release [ 2860.879252][ T32] kobject: 'tx-0': free name [ 2860.879823][ T1070] ? lock_acquire+0x190/0x410 [ 2860.884320][ T32] kobject: 'queues' (00000000ab3702fa): kobject_cleanup, parent 00000000a93730df [ 2860.888526][ T1070] worker_thread+0x98/0xe40 [ 2860.898058][ T32] kobject: 'queues' (00000000ab3702fa): calling ktype release [ 2860.909870][ T32] kobject: 'queues' (00000000ab3702fa): kset_release [ 2860.916556][ T32] kobject: 'queues': free name [ 2860.919892][ T1070] kthread+0x361/0x430 [ 2860.923541][ T32] kobject: 'hsr_slave_1' (000000008aa94ace): kobject_uevent_env [ 2860.925412][ T1070] ? process_one_work+0x1740/0x1740 [ 2860.938604][ T1070] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2860.944936][ T1070] ret_from_fork+0x24/0x30 [ 2860.945210][ T32] kobject: 'hsr_slave_1' (000000008aa94ace): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2860.949462][ T1070] INFO: task kworker/1:10:24813 blocked for more than 144 seconds. [ 2860.968774][ T1070] Not tainted 5.4.0-rc1+ #0 [ 2860.972662][ T32] kobject: 'batman_adv' (00000000f5f3b096): kobject_uevent_env [ 2860.979835][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2860.981869][ T32] kobject: 'batman_adv' (00000000f5f3b096): kobject_uevent_env: filter function caused the event to drop! [ 2860.999841][ T1070] kworker/1:10 D27112 24813 2 0x80004000 [ 2861.007791][ T1070] Workqueue: ipv6_addrconf addrconf_dad_work [ 2861.013961][ T1070] Call Trace: [ 2861.014206][ T32] kobject: 'batman_adv' (00000000f5f3b096): kobject_cleanup, parent 00000000a93730df [ 2861.017259][ T1070] __schedule+0x94f/0x1e70 [ 2861.031278][ T1070] ? __sched_text_start+0x8/0x8 [ 2861.036132][ T1070] ? __kasan_check_read+0x11/0x20 [ 2861.039805][ T32] kobject: 'batman_adv' (00000000f5f3b096): calling ktype release [ 2861.049120][ T32] kobject: (00000000f5f3b096): dynamic_kobj_release [ 2861.049846][ T1070] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2861.057759][ T32] kobject: 'batman_adv': free name [ 2861.066634][ T32] kobject: 'rx-0' (0000000022ddcf11): kobject_cleanup, parent 00000000c302b467 [ 2861.069861][ T1070] schedule+0xd9/0x260 [ 2861.076017][ T32] kobject: 'rx-0' (0000000022ddcf11): auto cleanup 'remove' event [ 2861.079632][ T1070] schedule_preempt_disabled+0x13/0x20 [ 2861.093211][ T1070] __mutex_lock+0x7b0/0x13c0 [ 2861.097811][ T1070] ? rtnl_lock+0x17/0x20 [ 2861.099821][ T32] kobject: 'rx-0' (0000000022ddcf11): kobject_uevent_env [ 2861.102250][ T1070] ? mutex_trylock+0x2d0/0x2d0 [ 2861.113966][ T32] kobject: 'rx-0' (0000000022ddcf11): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2861.124814][ T1070] ? mark_lock+0xc2/0x1220 [ 2861.129261][ T1070] mutex_lock_nested+0x16/0x20 [ 2861.134143][ T32] kobject: 'rx-0' (0000000022ddcf11): auto cleanup kobject_del [ 2861.141769][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2861.148011][ T1070] ? mutex_lock_nested+0x16/0x20 [ 2861.153069][ T1070] rtnl_lock+0x17/0x20 [ 2861.153441][ T32] kobject: 'rx-0' (0000000022ddcf11): calling ktype release [ 2861.157157][ T1070] addrconf_dad_work+0xad/0x1150 [ 2861.169457][ T1070] ? addrconf_dad_completed+0xbb0/0xbb0 [ 2861.175159][ T1070] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2861.175325][ T32] kobject: 'rx-0': free name [ 2861.180801][ T1070] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2861.180813][ T1070] ? trace_hardirqs_on+0x67/0x240 [ 2861.180835][ T1070] process_one_work+0x9af/0x1740 [ 2861.180859][ T1070] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2861.180873][ T1070] ? lock_acquire+0x190/0x410 [ 2861.180898][ T1070] worker_thread+0x98/0xe40 [ 2861.180912][ T1070] ? trace_hardirqs_on+0x67/0x240 [ 2861.180941][ T1070] kthread+0x361/0x430 [ 2861.180957][ T1070] ? process_one_work+0x1740/0x1740 [ 2861.180971][ T1070] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2861.180989][ T1070] ret_from_fork+0x24/0x30 [ 2861.189815][ T1070] INFO: task kworker/0:13:24820 blocked for more than 144 seconds. [ 2861.193876][ T32] kobject: 'tx-0' (000000003a41cdd7): kobject_cleanup, parent 00000000c302b467 [ 2861.196982][ T1070] Not tainted 5.4.0-rc1+ #0 [ 2861.202525][ T32] kobject: 'tx-0' (000000003a41cdd7): auto cleanup 'remove' event [ 2861.249955][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2861.259011][ T32] kobject: 'tx-0' (000000003a41cdd7): kobject_uevent_env [ 2861.279847][ T1070] kworker/0:13 D27000 24820 2 0x80004000 [ 2861.280593][ T32] kobject: 'tx-0' (000000003a41cdd7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2861.287115][ T1070] Workqueue: ipv6_addrconf addrconf_dad_work [ 2861.293952][ T32] kobject: 'tx-0' (000000003a41cdd7): auto cleanup kobject_del [ 2861.318360][ T32] kobject: 'tx-0' (000000003a41cdd7): calling ktype release [ 2861.326920][ T32] kobject: 'tx-0': free name [ 2861.330059][ T1070] Call Trace: [ 2861.332020][ T32] kobject: 'queues' (00000000c302b467): kobject_cleanup, parent 00000000a93730df [ 2861.334834][ T1070] __schedule+0x94f/0x1e70 [ 2861.344233][ T32] kobject: 'queues' (00000000c302b467): calling ktype release [ 2861.356294][ T1070] ? __sched_text_start+0x8/0x8 [ 2861.361435][ T32] kobject: 'queues' (00000000c302b467): kset_release [ 2861.368116][ T32] kobject: 'queues': free name [ 2861.373243][ T1070] ? __kasan_check_read+0x11/0x20 [ 2861.378284][ T1070] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2861.384484][ T32] kobject: 'veth1_to_hsr' (000000002bd471cc): kobject_uevent_env [ 2861.392564][ T1070] schedule+0xd9/0x260 [ 2861.396638][ T1070] schedule_preempt_disabled+0x13/0x20 [ 2861.402533][ T32] kobject: 'veth1_to_hsr' (000000002bd471cc): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2861.414384][ T1070] __mutex_lock+0x7b0/0x13c0 [ 2861.418986][ T1070] ? rtnl_lock+0x17/0x20 [ 2861.425620][ T32] kobject: 'batman_adv' (0000000057904225): kobject_uevent_env [ 2861.433586][ T1070] ? mutex_trylock+0x2d0/0x2d0 [ 2861.438362][ T1070] ? mark_lock+0xc2/0x1220 [ 2861.443160][ T1070] ? perf_trace_lock_acquire+0xf5/0x530 [ 2861.448722][ T1070] mutex_lock_nested+0x16/0x20 [ 2861.454742][ T32] kobject: 'batman_adv' (0000000057904225): kobject_uevent_env: filter function caused the event to drop! [ 2861.466403][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2861.473048][ T32] kobject: 'batman_adv' (0000000057904225): kobject_cleanup, parent 00000000a93730df [ 2861.482823][ T1070] ? mutex_lock_nested+0x16/0x20 [ 2861.487766][ T1070] rtnl_lock+0x17/0x20 [ 2861.489992][ T32] kobject: 'batman_adv' (0000000057904225): calling ktype release [ 2861.499627][ T32] kobject: (0000000057904225): dynamic_kobj_release [ 2861.499795][ T1070] addrconf_dad_work+0xad/0x1150 [ 2861.506429][ T32] kobject: 'batman_adv': free name [ 2861.516513][ T32] kobject: 'rx-0' (00000000f7c1c4f9): kobject_cleanup, parent 000000005dab216f [ 2861.519804][ T1070] ? addrconf_dad_completed+0xbb0/0xbb0 [ 2861.525553][ T32] kobject: 'rx-0' (00000000f7c1c4f9): auto cleanup 'remove' event [ 2861.538823][ T32] kobject: 'rx-0' (00000000f7c1c4f9): kobject_uevent_env [ 2861.539795][ T1070] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2861.545950][ T32] kobject: 'rx-0' (00000000f7c1c4f9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2861.562327][ T1070] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2861.568313][ T1070] ? trace_hardirqs_on+0x67/0x240 [ 2861.573715][ T32] kobject: 'rx-0' (00000000f7c1c4f9): auto cleanup kobject_del [ 2861.573776][ T32] kobject: 'rx-0' (00000000f7c1c4f9): calling ktype release [ 2861.573784][ T32] kobject: 'rx-0': free name [ 2861.573882][ T32] kobject: 'tx-0' (00000000b1395be8): kobject_cleanup, parent 000000005dab216f [ 2861.573891][ T32] kobject: 'tx-0' (00000000b1395be8): auto cleanup 'remove' event [ 2861.573901][ T32] kobject: 'tx-0' (00000000b1395be8): kobject_uevent_env [ 2861.573911][ T32] kobject: 'tx-0' (00000000b1395be8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2861.573920][ T32] kobject: 'tx-0' (00000000b1395be8): auto cleanup kobject_del [ 2861.573986][ T32] kobject: 'tx-0' (00000000b1395be8): calling ktype release [ 2861.573993][ T32] kobject: 'tx-0': free name [ 2861.574032][ T32] kobject: 'queues' (000000005dab216f): kobject_cleanup, parent 00000000a93730df [ 2861.574041][ T32] kobject: 'queues' (000000005dab216f): calling ktype release [ 2861.574050][ T32] kobject: 'queues' (000000005dab216f): kset_release [ 2861.574065][ T32] kobject: 'queues': free name [ 2861.574650][ T32] kobject: 'hsr_slave_0' (0000000053407fe0): kobject_uevent_env [ 2861.582404][ T1070] process_one_work+0x9af/0x1740 [ 2861.582432][ T1070] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2861.582447][ T1070] ? lock_acquire+0x190/0x410 [ 2861.582474][ T1070] worker_thread+0x98/0xe40 [ 2861.582530][ T1070] kthread+0x361/0x430 [ 2861.582560][ T1070] ? process_one_work+0x1740/0x1740 [ 2861.582588][ T1070] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2861.582621][ T1070] ret_from_fork+0x24/0x30 [ 2861.582752][ T1070] INFO: task syz-executor.4:25185 blocked for more than 144 seconds. [ 2861.582762][ T1070] Not tainted 5.4.0-rc1+ #0 [ 2861.582767][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2861.582778][ T1070] syz-executor.4 D24008 25185 1 0x80004006 [ 2861.619805][ T32] kobject: 'hsr_slave_0' (0000000053407fe0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2861.629332][ T1070] Call Trace: [ 2861.652621][ T32] kobject: 'batman_adv' (00000000fabcb5e2): kobject_uevent_env [ 2861.659645][ T1070] __schedule+0x94f/0x1e70 [ 2861.679813][ T32] kobject: 'batman_adv' (00000000fabcb5e2): kobject_uevent_env: filter function caused the event to drop! [ 2861.684790][ T1070] ? __sched_text_start+0x8/0x8 [ 2861.689642][ T32] kobject: 'batman_adv' (00000000fabcb5e2): kobject_cleanup, parent 00000000a93730df [ 2861.695014][ T1070] ? lock_downgrade+0x920/0x920 [ 2861.695029][ T1070] ? rwlock_bug.part.0+0x90/0x90 [ 2861.695082][ T1070] schedule+0xd9/0x260 [ 2861.695111][ T1070] schedule_preempt_disabled+0x13/0x20 [ 2861.695137][ T1070] __mutex_lock+0x7b0/0x13c0 [ 2861.695157][ T1070] ? rtnl_lock+0x17/0x20 [ 2861.695188][ T1070] ? mutex_trylock+0x2d0/0x2d0 [ 2861.695216][ T1070] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2861.695249][ T1070] ? debug_object_active_state+0x28a/0x350 [ 2861.700657][ T32] kobject: 'batman_adv' (00000000fabcb5e2): calling ktype release [ 2861.716880][ T1070] ? trace_hardirqs_on+0x67/0x240 [ 2861.720424][ T32] kobject: (00000000fabcb5e2): dynamic_kobj_release [ 2861.724841][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2861.734191][ T32] kobject: 'batman_adv': free name [ 2861.749841][ T1070] ? fsnotify+0x802/0xbb0 [ 2861.757367][ T32] kobject: 'rx-0' (000000004bbac20b): kobject_cleanup, parent 000000008bd92fc8 [ 2861.779932][ T1070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2861.780528][ T32] kobject: 'rx-0' (000000004bbac20b): auto cleanup 'remove' event [ 2861.799848][ T1070] ? locks_remove_file+0x32f/0x580 [ 2861.829821][ T32] kobject: 'rx-0' (000000004bbac20b): kobject_uevent_env [ 2861.830408][ T1070] ? fsnotify_first_mark+0x210/0x210 [ 2861.834428][ T32] kobject: 'rx-0' (000000004bbac20b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2861.839171][ T1070] mutex_lock_nested+0x16/0x20 [ 2861.859799][ T32] kobject: 'rx-0' (000000004bbac20b): auto cleanup kobject_del [ 2861.863734][ T1070] ? mutex_lock_nested+0x16/0x20 [ 2861.879842][ T32] kobject: 'rx-0' (000000004bbac20b): calling ktype release [ 2861.881771][ T1070] rtnl_lock+0x17/0x20 [ 2861.885934][ T32] kobject: 'rx-0': free name [ 2861.895246][ T1070] tun_chr_close+0x3f/0x180 [ 2861.919885][ T32] kobject: 'tx-0' (000000001d084b55): kobject_cleanup, parent 000000008bd92fc8 [ 2861.921443][ T1070] __fput+0x2ff/0x890 [ 2861.926639][ T32] kobject: 'tx-0' (000000001d084b55): auto cleanup 'remove' event [ 2861.937427][ T1070] ? __tun_detach+0x1040/0x1040 [ 2861.937467][ T1070] ____fput+0x16/0x20 [ 2861.937498][ T1070] task_work_run+0x145/0x1c0 [ 2861.937534][ T1070] do_exit+0x904/0x2e60 [ 2861.937572][ T1070] ? mm_update_next_owner+0x640/0x640 [ 2861.937606][ T1070] ? lock_downgrade+0x920/0x920 [ 2861.937635][ T1070] ? _raw_spin_unlock_irq+0x28/0x90 [ 2861.937663][ T1070] ? get_signal+0x392/0x2500 [ 2861.937677][ T1070] ? _raw_spin_unlock_irq+0x28/0x90 [ 2861.937723][ T1070] do_group_exit+0x135/0x360 [ 2861.937754][ T1070] get_signal+0x47c/0x2500 [ 2861.937784][ T1070] ? __do_page_fault+0x56a/0xdd0 [ 2861.943278][ T32] kobject: 'tx-0' (000000001d084b55): kobject_uevent_env [ 2861.959864][ T1070] do_signal+0x87/0x1700 [ 2861.963060][ T32] kobject: 'tx-0' (000000001d084b55): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2861.966602][ T1070] ? __kasan_check_write+0x14/0x20 [ 2861.971507][ T32] kobject: 'tx-0' (000000001d084b55): auto cleanup kobject_del [ 2861.989901][ T1070] ? setup_sigcontext+0x7d0/0x7d0 [ 2861.997885][ T32] kobject: 'tx-0' (000000001d084b55): calling ktype release [ 2862.019914][ T1070] ? down_read_non_owner+0x490/0x490 [ 2862.021228][ T32] kobject: 'tx-0': free name [ 2862.024887][ T1070] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2862.030424][ T32] kobject: 'queues' (000000008bd92fc8): kobject_cleanup, parent 00000000a93730df [ 2862.109886][ T1070] ? handle_mm_fault+0x4b0/0xaa0 [ 2862.111800][ T32] kobject: 'queues' (000000008bd92fc8): calling ktype release [ 2862.117604][ T1070] ? exit_to_usermode_loop+0x43/0x380 [ 2862.127028][ T32] kobject: 'queues' (000000008bd92fc8): kset_release [ 2862.152925][ T32] kobject: 'queues': free name [ 2862.158341][ T32] kobject: 'veth0_to_hsr' (0000000085254b4a): kobject_uevent_env [ 2862.159927][ T1070] ? prepare_exit_to_usermode+0x2ff/0x370 [ 2862.166494][ T32] kobject: 'veth0_to_hsr' (0000000085254b4a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2862.179822][ T1070] ? exit_to_usermode_loop+0x43/0x380 [ 2862.188649][ T1070] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2862.194106][ T1070] ? trace_hardirqs_on+0x67/0x240 [ 2862.199152][ T1070] exit_to_usermode_loop+0x286/0x380 [ 2862.204496][ T1070] prepare_exit_to_usermode+0x2ff/0x370 [ 2862.210191][ T1070] retint_user+0x8/0x18 [ 2862.214341][ T1070] RIP: 0033:0x430b36 [ 2862.218230][ T1070] Code: cc cc cc cc 64 48 8b 0c 25 f8 ff ff ff 48 3b 61 10 76 73 48 83 ec 28 48 89 6c 24 20 48 8d 6c 24 20 31 c0 48 8d 0d 0a 35 42 01 <87> 01 85 c0 76 2a 89 44 24 14 31 c9 eb 14 89 4c 24 10 e8 53 00 00 [ 2862.237973][ T1070] RSP: 002b:00007fff4f342820 EFLAGS: 00010206 [ 2862.244109][ T1070] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 2862.252301][ T1070] RDX: 0000000001822930 RSI: 000000000182a970 RDI: 0000000000000003 [ 2862.260338][ T1070] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001821940 [ 2862.268312][ T1070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 2862.276404][ T1070] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 2862.284621][ T1070] INFO: task syz-executor.0:25230 blocked for more than 145 seconds. [ 2862.286257][ T32] team0 (unregistering): Port device team_slave_1 removed [ 2862.292860][ T1070] Not tainted 5.4.0-rc1+ #0 [ 2862.292880][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2862.292888][ T1070] syz-executor.0 D24008 25230 1 0x00000004 [ 2862.292937][ T1070] Call Trace: [ 2862.292961][ T1070] __schedule+0x94f/0x1e70 [ 2862.292982][ T1070] ? __sched_text_start+0x8/0x8 [ 2862.293011][ T1070] ? lock_downgrade+0x920/0x920 [ 2862.293039][ T1070] ? rwlock_bug.part.0+0x90/0x90 [ 2862.293070][ T1070] schedule+0xd9/0x260 [ 2862.293100][ T1070] schedule_preempt_disabled+0x13/0x20 [ 2862.293135][ T1070] __mutex_lock+0x7b0/0x13c0 [ 2862.293165][ T1070] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 2862.293180][ T1070] ? mutex_trylock+0x2d0/0x2d0 [ 2862.293192][ T1070] ? find_held_lock+0x35/0x130 [ 2862.293208][ T1070] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2862.293229][ T1070] ? lock_downgrade+0x920/0x920 [ 2862.293244][ T1070] ? rcu_read_lock_held_common+0x130/0x130 [ 2862.293261][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2862.293281][ T1070] mutex_lock_nested+0x16/0x20 [ 2862.293293][ T1070] ? mutex_lock_nested+0x16/0x20 [ 2862.293311][ T1070] rtnetlink_rcv_msg+0x40a/0xb00 [ 2862.321924][ T32] kobject: 'batman_adv' (00000000422690e4): kobject_uevent_env [ 2862.323868][ T1070] ? rtnl_bridge_getlink+0x910/0x910 [ 2862.328215][ T32] kobject: 'batman_adv' (00000000422690e4): kobject_uevent_env: filter function caused the event to drop! [ 2862.333232][ T1070] ? lock_downgrade+0x920/0x920 [ 2862.333252][ T1070] ? netlink_deliver_tap+0x22d/0xbf0 [ 2862.333267][ T1070] ? find_held_lock+0x35/0x130 [ 2862.333290][ T1070] netlink_rcv_skb+0x177/0x450 [ 2862.333306][ T1070] ? rtnl_bridge_getlink+0x910/0x910 [ 2862.333324][ T1070] ? netlink_ack+0xb50/0xb50 [ 2862.333339][ T1070] ? __kasan_check_read+0x11/0x20 [ 2862.333359][ T1070] ? netlink_deliver_tap+0x254/0xbf0 [ 2862.333379][ T1070] rtnetlink_rcv+0x1d/0x30 [ 2862.349838][ T32] kobject: 'batman_adv' (00000000422690e4): kobject_cleanup, parent 00000000a93730df [ 2862.352791][ T1070] netlink_unicast+0x531/0x710 [ 2862.357288][ T32] kobject: 'batman_adv' (00000000422690e4): calling ktype release [ 2862.362431][ T1070] ? netlink_attachskb+0x7c0/0x7c0 [ 2862.362449][ T1070] ? _copy_from_iter_full+0x25d/0x8c0 [ 2862.362465][ T1070] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2862.362481][ T1070] ? __check_object_size+0x3d/0x437 [ 2862.362502][ T1070] netlink_sendmsg+0x8a5/0xd60 [ 2862.362524][ T1070] ? netlink_unicast+0x710/0x710 [ 2862.362540][ T1070] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2862.362557][ T1070] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2862.362573][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2862.362587][ T1070] ? security_socket_sendmsg+0x8d/0xc0 [ 2862.362602][ T1070] ? netlink_unicast+0x710/0x710 [ 2862.362620][ T1070] sock_sendmsg+0xd7/0x130 [ 2862.362637][ T1070] __sys_sendto+0x262/0x380 [ 2862.362654][ T1070] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2862.362686][ T1070] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2862.362704][ T1070] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2862.362720][ T1070] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2862.362738][ T1070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2862.362758][ T1070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2862.399937][ T32] kobject: (00000000422690e4): dynamic_kobj_release [ 2862.404100][ T1070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2862.408959][ T32] kobject: 'batman_adv': free name [ 2862.416920][ T1070] ? do_syscall_64+0x26/0x760 [ 2862.450128][ T32] kobject: 'rx-0' (00000000f8838801): kobject_cleanup, parent 00000000854938a2 [ 2862.453952][ T1070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2862.458234][ T32] kobject: 'rx-0' (00000000f8838801): auto cleanup 'remove' event [ 2862.463293][ T1070] __x64_sys_sendto+0xe1/0x1a0 [ 2862.479804][ T32] kobject: 'rx-0' (00000000f8838801): kobject_uevent_env [ 2862.487707][ T1070] do_syscall_64+0xfa/0x760 [ 2862.499781][ T32] kobject: 'rx-0' (00000000f8838801): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2862.500264][ T1070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2862.504946][ T32] kobject: 'rx-0' (00000000f8838801): auto cleanup kobject_del [ 2862.510635][ T1070] RIP: 0033:0x4138a3 [ 2862.529842][ T32] kobject: 'rx-0' (00000000f8838801): calling ktype release [ 2862.531687][ T1070] Code: 30 44 00 b9 11 00 00 00 48 89 ee f3 a6 75 0c 48 c7 03 b0 39 41 00 e9 1a ff ff ff bf b5 30 44 00 b9 18 00 00 00 48 89 ee f3 a6 <75> 0c 48 c7 03 10 37 41 00 e9 fd fe ff ff bf cd 30 44 00 b9 0a 00 [ 2862.536738][ T32] kobject: 'rx-0': free name [ 2862.542502][ T1070] RSP: 002b:00007ffe1f4746a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2862.548682][ T32] kobject: 'tx-0' (000000009fd86cc6): kobject_cleanup, parent 00000000854938a2 [ 2862.619937][ T1070] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004138a3 [ 2862.620782][ T32] kobject: 'tx-0' (000000009fd86cc6): auto cleanup 'remove' event [ 2862.624619][ T1070] RDX: 000000000000002c RSI: 0000000000a70070 RDI: 0000000000000003 [ 2862.624631][ T1070] RBP: 0000000000000000 R08: 00007ffe1f4746b0 R09: 000000000000000c [ 2862.649801][ T32] kobject: 'tx-0' (000000009fd86cc6): kobject_uevent_env [ 2862.652555][ T1070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2862.659232][ T32] kobject: 'tx-0' (000000009fd86cc6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2862.663765][ T1070] R13: 0000000000000003 R14: 00007ffe1f474758 R15: 0000000000000000 [ 2862.663891][ T1070] INFO: task syz-executor.5:25242 blocked for more than 145 seconds. [ 2862.663914][ T1070] Not tainted 5.4.0-rc1+ #0 [ 2862.663932][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2862.663939][ T1070] syz-executor.5 D28000 25242 1091 0x00000004 [ 2862.663987][ T1070] Call Trace: [ 2862.664023][ T1070] __schedule+0x94f/0x1e70 [ 2862.689840][ T32] kobject: 'tx-0' (000000009fd86cc6): auto cleanup kobject_del [ 2862.709942][ T1070] ? __sched_text_start+0x8/0x8 [ 2862.723980][ T32] kobject: 'tx-0' (000000009fd86cc6): calling ktype release [ 2862.732936][ T1070] ? lock_downgrade+0x920/0x920 [ 2862.760600][ T32] kobject: 'tx-0': free name [ 2862.839933][ T1070] ? rwlock_bug.part.0+0x90/0x90 [ 2862.843255][ T32] kobject: 'queues' (00000000854938a2): kobject_cleanup, parent 00000000a93730df [ 2862.851147][ T1070] schedule+0xd9/0x260 [ 2862.869811][ T32] kobject: 'queues' (00000000854938a2): calling ktype release [ 2862.872811][ T1070] schedule_preempt_disabled+0x13/0x20 [ 2862.877353][ T32] kobject: 'queues' (00000000854938a2): kset_release [ 2862.886666][ T1070] __mutex_lock+0x7b0/0x13c0 [ 2862.886688][ T1070] ? rtnl_lock+0x17/0x20 [ 2862.886706][ T1070] ? mutex_trylock+0x2d0/0x2d0 [ 2862.886724][ T1070] ? kasan_unpoison_shadow+0x35/0x50 [ 2862.886738][ T1070] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2862.886755][ T1070] ? kasan_kmalloc+0x9/0x10 [ 2862.886767][ T1070] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2862.886785][ T1070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2862.886799][ T1070] ? __phys_addr+0xa4/0x120 [ 2862.886818][ T1070] mutex_lock_nested+0x16/0x20 [ 2862.886831][ T1070] ? mutex_lock_nested+0x16/0x20 [ 2862.886843][ T1070] rtnl_lock+0x17/0x20 [ 2862.886932][ T1070] nl80211_dump_wiphy+0x45/0x760 [ 2862.886953][ T1070] ? lock_downgrade+0x870/0x920 [ 2862.899817][ T32] kobject: 'queues': free name [ 2862.919937][ T1070] ? __kasan_check_write+0x14/0x20 [ 2862.950560][ T32] kobject: 'team_slave_1' (000000001c495660): kobject_uevent_env [ 2862.952676][ T1070] netlink_dump+0x558/0xfb0 [ 2862.956809][ T32] kobject: 'team_slave_1' (000000001c495660): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2862.961638][ T1070] ? netlink_broadcast+0x50/0x50 [ 2862.961669][ T1070] __netlink_dump_start+0x5b1/0x7d0 [ 2862.961691][ T1070] genl_rcv_msg+0xab1/0xea0 [ 2862.961715][ T1070] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 2862.961746][ T1070] ? nl80211_dump_wiphy_parse.isra.0.constprop.0+0x5e0/0x5e0 [ 2862.961764][ T1070] ? lockdep_genl_is_held+0x30/0x30 [ 2863.002894][ T32] kobject: 'batman_adv' (00000000367371c3): kobject_uevent_env [ 2863.014638][ T1070] ? mark_held_locks+0xf0/0xf0 [ 2863.014653][ T1070] ? find_held_lock+0x35/0x130 [ 2863.014676][ T1070] netlink_rcv_skb+0x177/0x450 [ 2863.014694][ T1070] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 2863.014712][ T1070] ? netlink_ack+0xb50/0xb50 [ 2863.014726][ T1070] ? __kasan_check_write+0x14/0x20 [ 2863.014746][ T1070] ? netlink_deliver_tap+0x254/0xbf0 [ 2863.014767][ T1070] genl_rcv+0x29/0x40 [ 2863.014781][ T1070] netlink_unicast+0x531/0x710 [ 2863.014800][ T1070] ? netlink_attachskb+0x7c0/0x7c0 [ 2863.014816][ T1070] ? _copy_from_iter_full+0x25d/0x8c0 [ 2863.014832][ T1070] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2863.014847][ T1070] ? __check_object_size+0x3d/0x437 [ 2863.014867][ T1070] netlink_sendmsg+0x8a5/0xd60 [ 2863.014889][ T1070] ? netlink_unicast+0x710/0x710 [ 2863.014903][ T1070] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2863.070000][ T32] kobject: 'batman_adv' (00000000367371c3): kobject_uevent_env: filter function caused the event to drop! [ 2863.071115][ T1070] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2863.076850][ T32] kobject: 'batman_adv' (00000000367371c3): kobject_cleanup, parent 00000000a93730df [ 2863.081450][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2863.081466][ T1070] ? security_socket_sendmsg+0x8d/0xc0 [ 2863.081483][ T1070] ? netlink_unicast+0x710/0x710 [ 2863.081501][ T1070] sock_sendmsg+0xd7/0x130 [ 2863.081518][ T1070] ___sys_sendmsg+0x803/0x920 [ 2863.081535][ T1070] ? copy_msghdr_from_user+0x440/0x440 [ 2863.081560][ T1070] ? __kasan_check_read+0x11/0x20 [ 2863.081577][ T1070] ? __fget+0x384/0x560 [ 2863.081596][ T1070] ? ksys_dup3+0x3e0/0x3e0 [ 2863.099814][ T32] kobject: 'batman_adv' (00000000367371c3): calling ktype release [ 2863.101844][ T1070] ? __fget_light+0x1a9/0x230 [ 2863.106555][ T32] kobject: (00000000367371c3): dynamic_kobj_release [ 2863.112060][ T1070] ? __fdget+0x1b/0x20 [ 2863.112079][ T1070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2863.112100][ T1070] __sys_sendmsg+0x105/0x1d0 [ 2863.112115][ T1070] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2863.112142][ T1070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2863.118058][ T32] kobject: 'batman_adv': free name [ 2863.189812][ T1070] ? do_syscall_64+0x26/0x760 [ 2863.191596][ T32] kobject: 'rx-0' (00000000730d56a5): kobject_cleanup, parent 000000003a70c30c [ 2863.196127][ T1070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2863.201084][ T32] kobject: 'rx-0' (00000000730d56a5): auto cleanup 'remove' event [ 2863.205344][ T1070] ? do_syscall_64+0x26/0x760 [ 2863.209505][ T32] kobject: 'rx-0' (00000000730d56a5): kobject_uevent_env [ 2863.217351][ T1070] __x64_sys_sendmsg+0x78/0xb0 [ 2863.217370][ T1070] do_syscall_64+0xfa/0x760 [ 2863.249794][ T32] kobject: 'rx-0' (00000000730d56a5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2863.254522][ T1070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2863.259103][ T32] kobject: 'rx-0' (00000000730d56a5): auto cleanup kobject_del [ 2863.263828][ T1070] RIP: 0033:0x459a59 [ 2863.263874][ T1070] Code: Bad RIP value. [ 2863.263888][ T1070] RSP: 002b:00007f51d1609c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2863.263919][ T1070] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2863.263941][ T1070] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2863.263962][ T1070] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2863.263984][ T1070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f51d160a6d4 [ 2863.263993][ T1070] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 2863.264117][ T1070] INFO: task syz-executor.5:25244 blocked for more than 146 seconds. [ 2863.264125][ T1070] Not tainted 5.4.0-rc1+ #0 [ 2863.264131][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2863.264137][ T1070] syz-executor.5 D27144 25244 1091 0x00000004 [ 2863.264160][ T1070] Call Trace: [ 2863.264178][ T1070] __schedule+0x94f/0x1e70 [ 2863.264197][ T1070] ? __sched_text_start+0x8/0x8 [ 2863.264212][ T1070] ? lock_downgrade+0x920/0x920 [ 2863.264224][ T1070] ? rwlock_bug.part.0+0x90/0x90 [ 2863.264243][ T1070] schedule+0xd9/0x260 [ 2863.264259][ T1070] schedule_preempt_disabled+0x13/0x20 [ 2863.264272][ T1070] __mutex_lock+0x7b0/0x13c0 [ 2863.264289][ T1070] ? rtnl_lock+0x17/0x20 [ 2863.264308][ T1070] ? mutex_trylock+0x2d0/0x2d0 [ 2863.264325][ T1070] ? kasan_unpoison_shadow+0x35/0x50 [ 2863.264341][ T1070] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2863.264358][ T1070] ? kasan_kmalloc+0x9/0x10 [ 2863.264372][ T1070] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2863.264389][ T1070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2863.264404][ T1070] ? __phys_addr+0xa4/0x120 [ 2863.264454][ T1070] mutex_lock_nested+0x16/0x20 [ 2863.264480][ T1070] ? mutex_lock_nested+0x16/0x20 [ 2863.264505][ T1070] rtnl_lock+0x17/0x20 [ 2863.264521][ T1070] nl80211_dump_wiphy+0x45/0x760 [ 2863.264549][ T1070] ? lock_downgrade+0x870/0x920 [ 2863.264579][ T1070] ? __kasan_check_write+0x14/0x20 [ 2863.264613][ T1070] netlink_dump+0x558/0xfb0 [ 2863.264647][ T1070] ? netlink_broadcast+0x50/0x50 [ 2863.264706][ T1070] __netlink_dump_start+0x5b1/0x7d0 [ 2863.289853][ T32] kobject: 'rx-0' (00000000730d56a5): calling ktype release [ 2863.293259][ T1070] genl_rcv_msg+0xab1/0xea0 [ 2863.299223][ T32] kobject: 'rx-0': free name [ 2863.304048][ T1070] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 2863.304084][ T1070] ? nl80211_dump_wiphy_parse.isra.0.constprop.0+0x5e0/0x5e0 [ 2863.304112][ T1070] ? lockdep_genl_is_held+0x30/0x30 [ 2863.304164][ T1070] ? mark_held_locks+0xf0/0xf0 [ 2863.304191][ T1070] ? find_held_lock+0x35/0x130 [ 2863.304239][ T1070] netlink_rcv_skb+0x177/0x450 [ 2863.304270][ T1070] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 2863.304301][ T1070] ? netlink_ack+0xb50/0xb50 [ 2863.304316][ T1070] ? __kasan_check_write+0x14/0x20 [ 2863.304364][ T1070] ? netlink_deliver_tap+0x254/0xbf0 [ 2863.329867][ T32] kobject: 'tx-0' (00000000f7cc3671): kobject_cleanup, parent 000000003a70c30c [ 2863.333712][ T1070] genl_rcv+0x29/0x40 [ 2863.337074][ T32] kobject: 'tx-0' (00000000f7cc3671): auto cleanup 'remove' event [ 2863.341187][ T1070] netlink_unicast+0x531/0x710 [ 2863.341209][ T1070] ? netlink_attachskb+0x7c0/0x7c0 [ 2863.341224][ T1070] ? _copy_from_iter_full+0x25d/0x8c0 [ 2863.341241][ T1070] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2863.341275][ T1070] ? __check_object_size+0x3d/0x437 [ 2863.341310][ T1070] netlink_sendmsg+0x8a5/0xd60 [ 2863.341359][ T1070] ? netlink_unicast+0x710/0x710 [ 2863.341387][ T1070] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2863.341418][ T1070] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2863.341448][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2863.341474][ T1070] ? security_socket_sendmsg+0x8d/0xc0 [ 2863.341491][ T1070] ? netlink_unicast+0x710/0x710 [ 2863.350233][ T32] kobject: 'tx-0' (00000000f7cc3671): kobject_uevent_env [ 2863.369878][ T1070] sock_sendmsg+0xd7/0x130 [ 2863.374138][ T32] kobject: 'tx-0' (00000000f7cc3671): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2863.382256][ T1070] ___sys_sendmsg+0x803/0x920 [ 2863.409795][ T32] kobject: 'tx-0' (00000000f7cc3671): auto cleanup kobject_del [ 2863.412228][ T1070] ? copy_msghdr_from_user+0x440/0x440 [ 2863.418104][ T32] kobject: 'tx-0' (00000000f7cc3671): calling ktype release [ 2863.429859][ T1070] ? __kasan_check_read+0x11/0x20 [ 2863.430904][ T32] kobject: 'tx-0': free name [ 2863.435805][ T1070] ? __fget+0x384/0x560 [ 2863.440712][ T32] kobject: 'queues' (000000003a70c30c): kobject_cleanup, parent 00000000a93730df [ 2863.444849][ T1070] ? ksys_dup3+0x3e0/0x3e0 [ 2863.459788][ T32] kobject: 'queues' (000000003a70c30c): calling ktype release [ 2863.464037][ T1070] ? __fget_light+0x1a9/0x230 [ 2863.468975][ T32] kobject: 'queues' (000000003a70c30c): kset_release [ 2863.474819][ T1070] ? __fdget+0x1b/0x20 [ 2863.474838][ T1070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2863.474860][ T1070] __sys_sendmsg+0x105/0x1d0 [ 2863.474882][ T1070] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2863.474910][ T1070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2863.474924][ T1070] ? do_syscall_64+0x26/0x760 [ 2863.474943][ T1070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2863.499932][ T32] kobject: 'queues': free name [ 2863.501893][ T1070] ? do_syscall_64+0x26/0x760 [ 2863.506662][ T32] kobject: 'veth1_to_team' (000000008b9b9329): kobject_uevent_env [ 2863.510176][ T1070] __x64_sys_sendmsg+0x78/0xb0 [ 2863.510195][ T1070] do_syscall_64+0xfa/0x760 [ 2863.510217][ T1070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2863.510228][ T1070] RIP: 0033:0x459a59 [ 2863.510248][ T1070] Code: Bad RIP value. [ 2863.510256][ T1070] RSP: 002b:00007f51d15c7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2863.510270][ T1070] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2863.510279][ T1070] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2863.510287][ T1070] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 2863.510296][ T1070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f51d15c86d4 [ 2863.510304][ T1070] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 2863.510381][ T1070] [ 2863.510381][ T1070] Showing all locks held in the system: [ 2863.529795][ T32] kobject: 'veth1_to_team' (000000008b9b9329): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2863.535111][ T1070] 7 locks held by kworker/u4:2/32: [ 2863.940343][ T1070] #0: ffff8880a98256a8 ((wq_completion)netns){+.+.}, at: process_one_work+0x88b/0x1740 [ 2863.950197][ T1070] #1: ffff8880a9ad7dc0 (net_cleanup_work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 2863.959608][ T1070] #2: ffffffff89997088 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0xa60 [ 2863.968829][ T1070] #3: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2863.977219][ T1070] #4: ffff88801779d970 (&team->lock){+.+.}, at: team_del_slave+0x2f/0x80 [ 2863.986220][ T1070] #5: ffffffff88faed38 (rcu_state.exp_mutex){+.+.}, at: synchronize_rcu_expedited+0x4d6/0x5f0 [ 2863.996930][ T1070] #6: ffff8880ae834d18 (&rq->lock){-.-.}, at: __schedule+0x266/0x1e70 [ 2864.005647][ T1070] 1 lock held by khungtaskd/1070: [ 2864.010988][ T1070] #0: ffffffff88faaf80 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 2864.020670][ T1070] 1 lock held by rsyslogd/8660: [ 2864.025516][ T1070] #0: ffff88808fd2b3e0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 2864.034512][ T1070] 2 locks held by getty/8749: [ 2864.039181][ T1070] #0: ffff88809bbd4b50 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2864.048659][ T1070] #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2864.058701][ T1070] 2 locks held by getty/8750: [ 2864.063697][ T1070] #0: ffff8880924c8310 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2864.072994][ T1070] #1: ffffc90005f392e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2864.082918][ T1070] 2 locks held by getty/8751: [ 2864.087592][ T1070] #0: ffff88809bbd42d0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2864.096937][ T1070] #1: ffffc90005f2d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2864.106853][ T1070] 2 locks held by getty/8752: [ 2864.111839][ T1070] #0: ffff88809c71aa10 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2864.121119][ T1070] #1: ffffc90005f192e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2864.131531][ T1070] 2 locks held by getty/8753: [ 2864.136211][ T1070] #0: ffff8880924c9410 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2864.145571][ T1070] #1: ffffc90005f312e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2864.155501][ T1070] 2 locks held by getty/8754: [ 2864.160509][ T1070] #0: ffff8880924c8b90 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2864.170515][ T1070] #1: ffffc90005f352e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2864.180461][ T1070] 2 locks held by getty/8755: [ 2864.185132][ T1070] #0: ffff88808a0e80d0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2864.194488][ T1070] #1: ffffc90005f092e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2864.204448][ T1070] 2 locks held by kworker/u4:1/12560: [ 2864.210634][ T1070] 3 locks held by kworker/1:7/24808: [ 2864.215926][ T1070] #0: ffff8880aa4278e8 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 2864.226188][ T1070] #1: ffff88808743fdc0 ((linkwatch_work).work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 2864.236386][ T1070] #2: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2864.244727][ T1070] 3 locks held by kworker/1:8/24810: [ 2864.250308][ T1070] #0: ffff8880aa4278e8 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 2864.260466][ T1070] #1: ffff888021107dc0 (deferred_process_work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 2864.270640][ T1070] #2: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2864.278645][ T1070] 3 locks held by kworker/1:10/24813: [ 2864.284492][ T1070] #0: ffff88809c809de8 ((wq_completion)ipv6_addrconf){+.+.}, at: process_one_work+0x88b/0x1740 [ 2864.295300][ T1070] #1: ffff888017c87dc0 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 2864.307310][ T1070] #2: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2864.315671][ T1070] 3 locks held by kworker/0:13/24820: [ 2864.321489][ T1070] #0: ffff88809c809de8 ((wq_completion)ipv6_addrconf){+.+.}, at: process_one_work+0x88b/0x1740 [ 2864.332268][ T1070] #1: ffff888016587dc0 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 2864.344352][ T1070] #2: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2864.352834][ T1070] 2 locks held by kworker/0:16/24823: [ 2864.358212][ T1070] #0: ffff8880aa435ba8 ((wq_completion)rcu_gp){+.+.}, at: process_one_work+0x88b/0x1740 [ 2864.368481][ T1070] #1: ffff88801655fdc0 ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 2864.379824][ T1070] 1 lock held by syz-executor.4/25185: [ 2864.385284][ T1070] #0: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2864.393709][ T1070] 1 lock held by syz-executor.0/25230: [ 2864.399158][ T1070] #0: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40a/0xb00 [ 2864.408409][ T1070] 3 locks held by syz-executor.5/25242: [ 2864.414274][ T1070] #0: ffffffff899f5268 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 2864.422286][ T1070] #1: ffff888084921198 (nlk_cb_mutex-GENERIC){+.+.}, at: netlink_dump+0xe7/0xfb0 [ 2864.431883][ T1070] #2: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2864.440227][ T1070] 3 locks held by syz-executor.5/25244: [ 2864.445769][ T1070] #0: ffffffff899f5268 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 2864.453797][ T1070] #1: ffff888085abd298 (nlk_cb_mutex-GENERIC){+.+.}, at: netlink_dump+0xe7/0xfb0 [ 2864.463381][ T1070] #2: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2864.471818][ T1070] [ 2864.473521][ T32] team0 (unregistering): Port device team_slave_0 removed [ 2864.474149][ T1070] ============================================= [ 2864.474149][ T1070] [ 2864.489843][ T1070] NMI backtrace for cpu 1 [ 2864.491738][ T32] kobject: 'batman_adv' (000000006f74c55d): kobject_uevent_env [ 2864.494168][ T1070] CPU: 1 PID: 1070 Comm: khungtaskd Not tainted 5.4.0-rc1+ #0 [ 2864.509124][ T1070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2864.519172][ T1070] Call Trace: [ 2864.519797][ T32] kobject: 'batman_adv' (000000006f74c55d): kobject_uevent_env: filter function caused the event to drop! [ 2864.522459][ T1070] dump_stack+0x172/0x1f0 [ 2864.538069][ T1070] nmi_cpu_backtrace.cold+0x70/0xb2 [ 2864.543268][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2864.549511][ T1070] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 2864.549853][ T32] kobject: 'batman_adv' (000000006f74c55d): kobject_cleanup, parent 00000000a93730df [ 2864.555141][ T1070] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 2864.570539][ T1070] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2864.576427][ T1070] watchdog+0x9d0/0xef0 [ 2864.579785][ T32] kobject: 'batman_adv' (000000006f74c55d): calling ktype release [ 2864.580584][ T1070] kthread+0x361/0x430 [ 2864.588360][ T32] kobject: (000000006f74c55d): dynamic_kobj_release [ 2864.592401][ T1070] ? reset_hung_task_detector+0x30/0x30 [ 2864.592415][ T1070] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2864.592437][ T1070] ret_from_fork+0x24/0x30 [ 2864.609794][ T32] kobject: 'batman_adv': free name [ 2864.611212][ T1070] Sending NMI from CPU 1 to CPUs 0: [ 2864.615384][ T32] kobject: 'rx-0' (00000000f70fa9aa): kobject_cleanup, parent 00000000e540f45d [ 2864.621303][ C0] NMI backtrace for cpu 0 [ 2864.621309][ C0] CPU: 0 PID: 32 Comm: kworker/u4:2 Not tainted 5.4.0-rc1+ #0 [ 2864.621314][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2864.621317][ C0] Workqueue: netns cleanup_net [ 2864.621323][ C0] RIP: 0010:debug_lockdep_rcu_enabled+0x56/0xa0 [ 2864.621334][ C0] Code: 75 49 8b 15 5c 0f 67 08 85 d2 74 3b 48 c7 c0 f4 d3 c6 89 48 ba 00 00 00 00 00 fc ff df 48 89 c1 83 e0 07 48 c1 e9 03 83 c0 03 <0f> b6 14 11 38 d0 7c 04 84 d2 75 23 8b 05 2c 40 67 08 85 c0 74 07 [ 2864.621337][ C0] RSP: 0018:ffff8880ae809a60 EFLAGS: 00000002 [ 2864.621344][ C0] RAX: 0000000000000007 RBX: 1ffff11015d01353 RCX: 1ffffffff138da7e [ 2864.621348][ C0] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffffffff89c6a200 [ 2864.621352][ C0] RBP: ffff8880ae809a60 R08: 1ffffffff138d440 R09: fffffbfff138d441 [ 2864.621357][ C0] R10: fffffbfff138d440 R11: ffffffff89c6a207 R12: ffffffff8ad3a6a0 [ 2864.621361][ C0] R13: ffffffff83478511 R14: ffff8880ae809b18 R15: 0000000000000000 [ 2864.621366][ C0] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2864.621370][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2864.621375][ C0] CR2: ffffffffff600400 CR3: 000000009b9dd000 CR4: 00000000001406f0 [ 2864.621379][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2864.621383][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2864.621386][ C0] Call Trace: [ 2864.621388][ C0] [ 2864.621391][ C0] lock_release+0x60a/0x960 [ 2864.621394][ C0] ? __kasan_check_write+0x14/0x20 [ 2864.621397][ C0] ? lock_downgrade+0x920/0x920 [ 2864.621400][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 2864.621403][ C0] ? lock_acquire+0x190/0x410 [ 2864.621406][ C0] ? debug_object_activate+0x131/0x470 [ 2864.621410][ C0] _raw_spin_unlock_irqrestore+0x1f/0xe0 [ 2864.621413][ C0] debug_object_activate+0x201/0x470 [ 2864.621416][ C0] ? debug_object_init_on_stack+0x20/0x20 [ 2864.621419][ C0] ? find_held_lock+0x35/0x130 [ 2864.621423][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2864.621426][ C0] __queue_work+0xcf/0x1280 [ 2864.621429][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2864.621432][ C0] delayed_work_timer_fn+0x5d/0x90 [ 2864.621435][ C0] call_timer_fn+0x1ac/0x780 [ 2864.621438][ C0] ? queue_work_node+0x380/0x380 [ 2864.621442][ C0] ? msleep_interruptible+0x150/0x150 [ 2864.621445][ C0] ? queue_work_node+0x380/0x380 [ 2864.621448][ C0] ? __kasan_check_read+0x11/0x20 [ 2864.621451][ C0] ? do_raw_spin_unlock+0x57/0x270 [ 2864.621454][ C0] ? queue_work_node+0x380/0x380 [ 2864.621458][ C0] run_timer_softirq+0x48c/0x1790 [ 2864.621460][ C0] ? add_timer+0x930/0x930 [ 2864.621464][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2864.621467][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2864.621471][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2864.621474][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2864.621477][ C0] __do_softirq+0x262/0x98c [ 2864.621480][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 2864.621483][ C0] irq_exit+0x19b/0x1e0 [ 2864.621486][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 2864.621489][ C0] apic_timer_interrupt+0xf/0x20 [ 2864.621491][ C0] [ 2864.621495][ C0] RIP: 0010:vprintk_emit+0x5df/0x700 [ 2864.621504][ C0] Code: 00 48 b8 00 00 00 00 00 fc ff df 41 80 3c 06 00 0f 85 f8 00 00 00 48 83 3d 0d 84 96 07 00 74 6a e8 96 82 16 00 48 89 df 57 9d <0f> 1f 44 00 00 e9 06 ff ff ff e8 82 82 16 00 49 c1 ee 03 e8 f9 f9 [ 2864.621508][ C0] RSP: 0018:ffff8880a9ad7730 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 2864.621516][ C0] RAX: ffff8880a9aaa100 RBX: 0000000000000293 RCX: 0000000000000006 [ 2864.621520][ C0] RDX: 0000000000000000 RSI: ffffffff815c995a RDI: 0000000000000293 [ 2864.621524][ C0] RBP: ffff8880a9ad7778 R08: 1ffffffff14f0537 R09: fffffbfff14f0538 [ 2864.621529][ C0] R10: fffffbfff14f0537 R11: ffffffff8a7829bf R12: 000000000000004c [ 2864.621533][ C0] R13: 0000000000000200 R14: 1ffffffff11e63ac R15: ffff8880a7e626c0 [ 2864.621536][ C0] ? vprintk_emit+0x5da/0x700 [ 2864.621539][ C0] vprintk_default+0x28/0x30 [ 2864.621542][ C0] vprintk_func+0x7e/0x189 [ 2864.621545][ C0] ? trace_hardirqs_on+0x67/0x240 [ 2864.621547][ C0] printk+0xba/0xed [ 2864.621551][ C0] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 2864.621554][ C0] kobject_put.cold+0x88/0x2e6 [ 2864.621557][ C0] net_rx_queue_update_kobjects+0x359/0x470 [ 2864.621560][ C0] netdev_unregister_kobject+0x151/0x1f0 [ 2864.621564][ C0] rollback_registered_many+0xafe/0x10d0 [ 2864.621567][ C0] ? generic_xdp_install+0x4a0/0x4a0 [ 2864.621570][ C0] ? __kasan_check_read+0x11/0x20 [ 2864.621574][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2864.621577][ C0] ? __kasan_check_read+0x11/0x20 [ 2864.621580][ C0] unregister_netdevice_many.part.0+0x1b/0x1f0 [ 2864.621584][ C0] default_device_exit_batch+0x34e/0x410 [ 2864.621587][ C0] ? unregister_netdevice_many+0x50/0x50 [ 2864.621590][ C0] ? default_device_exit+0x24f/0x2f0 [ 2864.621594][ C0] ? prepare_to_wait_exclusive+0x320/0x320 [ 2864.621596][ C0] ? rtnl_unlock+0xe/0x10 [ 2864.621600][ C0] ? unregister_netdevice_many+0x50/0x50 [ 2864.621603][ C0] ? dev_change_net_namespace+0xca0/0xca0 [ 2864.621606][ C0] ops_exit_list.isra.0+0xfc/0x150 [ 2864.621609][ C0] cleanup_net+0x4e2/0xa60 [ 2864.621612][ C0] ? netns_install+0x1d0/0x1d0 [ 2864.621615][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2864.621619][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2864.621622][ C0] ? trace_hardirqs_on+0x67/0x240 [ 2864.621625][ C0] process_one_work+0x9af/0x1740 [ 2864.621628][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2864.621631][ C0] ? lock_acquire+0x190/0x410 [ 2864.621634][ C0] worker_thread+0x98/0xe40 [ 2864.621637][ C0] kthread+0x361/0x430 [ 2864.621640][ C0] ? process_one_work+0x1740/0x1740 [ 2864.621644][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2864.621646][ C0] ret_from_fork+0x24/0x30 [ 2864.631473][ T1070] Kernel panic - not syncing: hung_task: blocked tasks [ 2864.659789][ T32] kobject: 'rx-0' (00000000f70fa9aa): auto cleanup 'remove' event [ 2864.663152][ T1070] CPU: 1 PID: 1070 Comm: khungtaskd Not tainted 5.4.0-rc1+ #0 [ 2864.669377][ T32] kobject: 'rx-0' (00000000f70fa9aa): kobject_uevent_env [ 2864.688961][ T1070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2864.688966][ T1070] Call Trace: [ 2864.688987][ T1070] dump_stack+0x172/0x1f0 [ 2864.689004][ T1070] panic+0x2dc/0x755 [ 2864.689017][ T1070] ? add_taint.cold+0x16/0x16 [ 2864.689029][ T1070] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 2864.689048][ T1070] ? ___preempt_schedule+0x16/0x20 [ 2864.736781][ T32] kobject: 'rx-0' (00000000f70fa9aa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2864.743791][ T1070] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 2864.743805][ T1070] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 2864.743817][ T1070] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 2864.743834][ T1070] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 2864.752187][ T32] kobject: 'rx-0' (00000000f70fa9aa): auto cleanup kobject_del [ 2864.758380][ T1070] watchdog+0x9e1/0xef0 [ 2864.758402][ T1070] kthread+0x361/0x430 [ 2864.758420][ T1070] ? reset_hung_task_detector+0x30/0x30 [ 2864.766522][ T32] kobject: 'rx-0' (00000000f70fa9aa): calling ktype release [ 2864.774355][ T1070] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2864.774372][ T1070] ret_from_fork+0x24/0x30 [ 2864.779108][ T1070] Kernel Offset: disabled [ 2865.350991][ T1070] Rebooting in 86400 seconds..