0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1392.928707] Killed process 29607 (syz-executor.2) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 03:46:56 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:46:57 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:46:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x1c1002) getsockopt$inet_buf(r3, 0x0, 0x2f, &(0x7f0000000100)=""/190, &(0x7f00000001c0)=0xbe) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r4, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fsetxattr$security_smack_entry(r5, &(0x7f0000000240)='security.SMACK64IPOUT\x00', &(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x12, 0x2) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000040)={0x60003, 0x0, [0x1, 0x3]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:46:57 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:46:57 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:46:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xdf8}], 0x1}}], 0x2, 0x0, 0x0) 03:46:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x50000, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x2, 0x0, 0x1, 0x9c, 0x0, 0x81d, 0x400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x20, 0x9, 0x3, 0x8, 0xfffffffffffffffc, 0x3}, r2, 0xc, r3, 0x12) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:46:57 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:46:57 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:46:57 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:46:57 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:46:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x600241, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x20003}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:46:57 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:46:57 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:46:57 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:46:57 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:46:57 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:46:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe00}], 0x1}}], 0x2, 0x0, 0x0) 03:46:58 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:46:58 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:46:58 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe800000000000000000fffff00000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1396.074048] IPVS: ftp: loaded support on port[0] = 21 [ 1396.097498] device bridge_slave_1 left promiscuous mode [ 1396.103162] bridge0: port 2(bridge_slave_1) entered disabled state [ 1396.175552] device bridge_slave_0 left promiscuous mode [ 1396.181109] bridge0: port 1(bridge_slave_0) entered disabled state [ 1399.297184] device hsr_slave_1 left promiscuous mode [ 1399.367742] device hsr_slave_0 left promiscuous mode [ 1399.417657] team0 (unregistering): Port device team_slave_1 removed [ 1399.430036] team0 (unregistering): Port device team_slave_0 removed [ 1399.441167] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1399.529095] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1399.648289] bond0 (unregistering): Released all slaves [ 1399.741813] chnl_net:caif_netlink_parms(): no params data found [ 1399.784370] bridge0: port 1(bridge_slave_0) entered blocking state [ 1399.791020] bridge0: port 1(bridge_slave_0) entered disabled state [ 1399.798286] device bridge_slave_0 entered promiscuous mode [ 1399.805783] bridge0: port 2(bridge_slave_1) entered blocking state [ 1399.812228] bridge0: port 2(bridge_slave_1) entered disabled state [ 1399.819741] device bridge_slave_1 entered promiscuous mode [ 1399.837384] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1399.846940] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1399.908667] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1399.917275] team0: Port device team_slave_0 added [ 1399.923249] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1399.931622] team0: Port device team_slave_1 added [ 1399.937712] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1399.945518] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1400.012795] device hsr_slave_0 entered promiscuous mode [ 1400.064785] device hsr_slave_1 entered promiscuous mode [ 1400.114987] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1400.122018] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1400.160362] bridge0: port 2(bridge_slave_1) entered blocking state [ 1400.167081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1400.173748] bridge0: port 1(bridge_slave_0) entered blocking state [ 1400.180205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1400.243670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1400.259788] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1400.277922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1400.290526] bridge0: port 1(bridge_slave_0) entered disabled state [ 1400.300457] bridge0: port 2(bridge_slave_1) entered disabled state [ 1400.317078] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1400.323272] 8021q: adding VLAN 0 to HW filter on device team0 [ 1400.343324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1400.358549] bridge0: port 1(bridge_slave_0) entered blocking state [ 1400.365766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1400.406310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1400.421744] bridge0: port 2(bridge_slave_1) entered blocking state [ 1400.428175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1400.445783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1400.463965] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1400.481192] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1400.493381] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1400.508289] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1400.520759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1400.531473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1400.544140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1400.567210] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1400.580458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1400.596660] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1400.787179] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1400.804189] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1400.810692] CPU: 1 PID: 29721 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1400.817656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.827050] Call Trace: [ 1400.829658] dump_stack+0x172/0x1f0 [ 1400.833306] dump_header+0x15e/0xa55 [ 1400.837038] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1400.842146] ? ___ratelimit+0x60/0x595 [ 1400.846156] ? do_raw_spin_unlock+0x57/0x270 [ 1400.850575] oom_kill_process.cold+0x10/0x6ef [ 1400.855435] out_of_memory+0x936/0x12d0 [ 1400.859420] ? oom_killer_disable+0x280/0x280 [ 1400.864077] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1400.869194] ? memcg_event_wake+0x230/0x230 [ 1400.873691] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1400.878819] ? cgroup_file_notify+0x140/0x1b0 [ 1400.883346] memory_max_write+0x169/0x300 [ 1400.887620] ? mem_cgroup_write+0x360/0x360 [ 1400.891967] ? lock_acquire+0x16f/0x3f0 [ 1400.895972] ? kernfs_fop_write+0x227/0x480 [ 1400.900318] cgroup_file_write+0x241/0x790 [ 1400.904639] ? mem_cgroup_write+0x360/0x360 [ 1400.908977] ? kill_css+0x380/0x380 [ 1400.912675] ? kill_css+0x380/0x380 [ 1400.916320] kernfs_fop_write+0x2b8/0x480 [ 1400.920598] __vfs_write+0x114/0x810 [ 1400.924325] ? kernfs_fop_open+0xd80/0xd80 [ 1400.928599] ? kernel_read+0x120/0x120 [ 1400.932521] ? __lock_is_held+0xb6/0x140 [ 1400.936799] ? rcu_read_lock_sched_held+0x110/0x130 [ 1400.941827] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1400.946603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1400.952407] ? __sb_start_write+0x1a9/0x360 [ 1400.957703] vfs_write+0x20c/0x560 [ 1400.961395] ksys_write+0x14f/0x2d0 [ 1400.965042] ? __ia32_sys_read+0xb0/0xb0 [ 1400.969142] __x64_sys_write+0x73/0xb0 [ 1400.973051] ? do_syscall_64+0x5b/0x620 [ 1400.977045] do_syscall_64+0xfd/0x620 [ 1400.980847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1400.986036] RIP: 0033:0x459a29 [ 1400.989238] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1401.009035] RSP: 002b:00007f724ffaac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1401.017145] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1401.024551] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1401.031984] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1401.039805] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f724ffab6d4 [ 1401.047080] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1401.070305] Task in /syz2 killed as a result of limit of /syz2 [ 1401.078529] memory: usage 3072kB, limit 0kB, failcnt 197 [ 1401.089029] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1401.096539] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1401.102917] Memory cgroup stats for /syz2: cache:156KB rss:2200KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1401.125265] Memory cgroup out of memory: Kill process 29719 (syz-executor.2) score 9273000 or sacrifice child [ 1401.136402] Killed process 29719 (syz-executor.2) total-vm:72584kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 1401.159685] oom_reaper: reaped process 29719 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 03:47:05 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:47:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x0, 0x2}, 0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x2, 0x339, 0x0, 0x8, 0x80000000, 0x5, 0x101, 0xb9, r5}, &(0x7f0000000140)=0x20) preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:47:05 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:05 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r4 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r4, 0x227a, 0x0) r5 = dup2(0xffffffffffffffff, r4) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SMI(r6, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f0000000040)={0x20003}) ioctl$KVM_RUN(r6, 0xae80, 0x0) 03:47:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe08}], 0x1}}], 0x2, 0x0, 0x0) [ 1401.421759] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1401.487995] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1401.499745] CPU: 0 PID: 29717 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1401.506816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.506822] Call Trace: [ 1401.506844] dump_stack+0x172/0x1f0 [ 1401.506862] dump_header+0x15e/0xa55 [ 1401.506878] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1401.506892] ? ___ratelimit+0x60/0x595 [ 1401.506911] ? do_raw_spin_unlock+0x57/0x270 [ 1401.506928] oom_kill_process.cold+0x10/0x6ef [ 1401.506944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1401.506956] ? task_will_free_mem+0x139/0x6e0 [ 1401.506980] out_of_memory+0x936/0x12d0 [ 1401.506995] ? lock_downgrade+0x810/0x810 [ 1401.507012] ? oom_killer_disable+0x280/0x280 [ 1401.507025] ? find_held_lock+0x35/0x130 [ 1401.507051] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1401.507064] ? memcg_event_wake+0x230/0x230 [ 1401.507081] ? do_raw_spin_unlock+0x57/0x270 [ 1401.532053] ? _raw_spin_unlock+0x2d/0x50 [ 1401.532074] try_charge+0xef7/0x1480 [ 1401.532090] ? find_held_lock+0x35/0x130 [ 1401.532109] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1401.559021] ? kasan_check_read+0x11/0x20 [ 1401.567850] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1401.567866] mem_cgroup_try_charge+0x259/0x6b0 [ 1401.567885] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1401.567909] wp_page_copy+0x430/0x16a0 [ 1401.567931] ? pmd_pfn+0x1d0/0x1d0 [ 1401.567946] ? kasan_check_read+0x11/0x20 [ 1401.567959] ? do_raw_spin_unlock+0x57/0x270 [ 1401.567976] do_wp_page+0x57d/0x10b0 [ 1401.567991] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1401.568005] ? kasan_check_write+0x14/0x20 [ 1401.589769] ? do_raw_spin_lock+0xc8/0x240 [ 1401.589794] __handle_mm_fault+0x2305/0x3f80 [ 1401.589818] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1401.597602] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1401.597618] handle_mm_fault+0x1b5/0x690 [ 1401.597637] __do_page_fault+0x62a/0xe90 [ 1401.597657] ? vmalloc_fault+0x740/0x740 [ 1401.597675] ? trace_hardirqs_off_caller+0x65/0x220 03:47:05 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1401.597687] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1401.597702] ? page_fault+0x8/0x30 [ 1401.597716] do_page_fault+0x71/0x57d [ 1401.597728] ? page_fault+0x8/0x30 [ 1401.597742] page_fault+0x1e/0x30 [ 1401.597752] RIP: 0033:0x430b06 [ 1401.597765] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1401.597771] RSP: 002b:00007ffe05087040 EFLAGS: 00010206 03:47:05 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x20003}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = socket(0x10, 0x2, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2c, r6, 0x94c81890d9f8125d, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xcd50b4c659db0303}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xdc, r6, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xca}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x800}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x10001}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x401}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffff9}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1a}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4}, 0x1) [ 1401.597782] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1401.597795] RDX: 00005555562b4930 RSI: 00005555562bc970 RDI: 0000000000000003 [ 1401.704322] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555562b3940 [ 1401.704330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1401.704339] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 03:47:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe10}], 0x1}}], 0x2, 0x0, 0x0) 03:47:05 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:05 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1401.954365] Task in /syz2 killed as a result of limit of /syz2 [ 1401.965830] memory: usage 736kB, limit 0kB, failcnt 205 [ 1401.990328] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1402.017302] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1402.038417] Memory cgroup stats for /syz2: cache:156KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1402.130457] Memory cgroup out of memory: Kill process 29717 (syz-executor.2) score 8758000 or sacrifice child [ 1402.167272] Killed process 29717 (syz-executor.2) total-vm:72452kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 1402.187523] oom_reaper: reaped process 29717 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 03:47:06 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:47:06 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:06 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x20003}) r4 = msgget(0x0, 0x42) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000380)=""/4096) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:47:06 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:47:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000100)={{0x1, 0x0, @identifier="f40455496f426be6de80f6fb2c63b7a5"}, 0xdf, [], "9417403c8cc8d5d24aaf2ee19433ff441a1c1d8cb22471f5caf8d1af652b3edd999c2bec73ea77d2518e336c6e7165c67f1f1624b97534dcf60527b9a31fba078be1f6ab61d2536d14a32e96977c04c1bdd13ee4e9c45038dc429c4ac620e5d90eb0ee892af9d3ae62630ca1e02dc8295ffd3b5cc73f15efc1f2d9826ea52eeeec2866d259d00e29b62e9144342ea29a60000711f3c2db0af250c944c963da43a1fc8bba67b2a1090eece4961898363bd41fa7a247870eed13588b2f833cb05c499a0882bdd5138d1b88ef4f62ac87f5b4a2bf8c4e62a664aec3bb65b4ea68"}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000280)={0xfffff800, 0x10b, "32251c4a6cf7c9a8b45757953f5fabe9b43f1d50114b538f56c69afac99bcff4", 0x81, 0x3bf4, 0x7fff, 0x3f, 0x104}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0x0, r3, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x62) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:47:06 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:06 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:06 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe18}], 0x1}}], 0x2, 0x0, 0x0) 03:47:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='\xdc\xa3d\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x20003}) r4 = getpid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r6 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r6, 0x227a, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r7, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$VIDIOC_EXPBUF(r7, 0xc0405610, &(0x7f0000000140)={0x4, 0x7fff, 0x4, 0x4000, 0xffffffffffffffff}) kcmp(r4, r5, 0x8c493b55d56933cd, r6, r8) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:47:06 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1403.015165] device bridge_slave_1 left promiscuous mode [ 1403.022074] bridge0: port 2(bridge_slave_1) entered disabled state [ 1403.085681] device bridge_slave_0 left promiscuous mode [ 1403.092557] bridge0: port 1(bridge_slave_0) entered disabled state 03:47:06 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000700aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:47:07 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:07 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000800aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1403.429013] device hsr_slave_1 left promiscuous mode 03:47:07 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000060800aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1403.486665] device hsr_slave_0 left promiscuous mode [ 1403.527821] team0 (unregistering): Port device team_slave_1 removed [ 1403.578515] team0 (unregistering): Port device team_slave_0 removed [ 1403.631630] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1403.701624] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1403.833000] bond0 (unregistering): Released all slaves [ 1405.184021] IPVS: ftp: loaded support on port[0] = 21 [ 1405.260201] chnl_net:caif_netlink_parms(): no params data found [ 1405.293147] bridge0: port 1(bridge_slave_0) entered blocking state [ 1405.300463] bridge0: port 1(bridge_slave_0) entered disabled state [ 1405.307893] device bridge_slave_0 entered promiscuous mode [ 1405.315288] bridge0: port 2(bridge_slave_1) entered blocking state [ 1405.321733] bridge0: port 2(bridge_slave_1) entered disabled state [ 1405.329568] device bridge_slave_1 entered promiscuous mode [ 1405.349261] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1405.358620] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1405.378163] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1405.385811] team0: Port device team_slave_0 added [ 1405.391428] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1405.399075] team0: Port device team_slave_1 added [ 1405.404598] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1405.412451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1405.476628] device hsr_slave_0 entered promiscuous mode [ 1405.514737] device hsr_slave_1 entered promiscuous mode [ 1405.555438] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1405.563602] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1405.579407] bridge0: port 2(bridge_slave_1) entered blocking state [ 1405.586121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1405.592892] bridge0: port 1(bridge_slave_0) entered blocking state [ 1405.599553] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1405.637891] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1405.644116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1405.656043] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1405.665326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1405.673226] bridge0: port 1(bridge_slave_0) entered disabled state [ 1405.680448] bridge0: port 2(bridge_slave_1) entered disabled state [ 1405.689012] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1405.701008] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1405.708339] 8021q: adding VLAN 0 to HW filter on device team0 [ 1405.718801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1405.727929] bridge0: port 1(bridge_slave_0) entered blocking state [ 1405.734418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1405.746217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1405.754041] bridge0: port 2(bridge_slave_1) entered blocking state [ 1405.760710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1405.789493] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1405.798352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1405.806210] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1405.813600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1405.821976] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1405.832004] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1405.838617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1405.852511] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1405.864414] 8021q: adding VLAN 0 to HW filter on device batadv0 03:47:09 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:09 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000100)={{0x2, 0x0, @descriptor="b592e49190def9e8"}, 0x6f, [], "2cb5a8a93d97d6c089ee9646f3ffef8d200ecf13b92b8d837e4063eba037848ff791fe615caa68863c7d7dd06729bdfea86f80ffbcdb5b5ec73b72e5afb511f951c5eebcd2d92bd5f8ae2c56a7f6ee29caac2579b5352b780c031e383fac97cacb703b87f5271e7ca3e8fef40d87a6"}) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f00000000c0)={0x2, 0x8, 0x1, 0x6838, 0x8a8b}) 03:47:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe20}], 0x1}}], 0x2, 0x0, 0x0) 03:47:09 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 03:47:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x20003, 0x0, [0x0, 0x0, 0x77]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:47:09 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:09 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:09 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1406.127726] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 03:47:09 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1406.213494] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1406.224377] CPU: 0 PID: 29833 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1406.231361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.240862] Call Trace: [ 1406.243479] dump_stack+0x172/0x1f0 [ 1406.247139] dump_header+0x15e/0xa55 [ 1406.250878] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1406.256105] ? ___ratelimit+0x60/0x595 [ 1406.260003] ? do_raw_spin_unlock+0x57/0x270 [ 1406.260024] oom_kill_process.cold+0x10/0x6ef [ 1406.260044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1406.274465] ? task_will_free_mem+0x139/0x6e0 [ 1406.274485] out_of_memory+0x936/0x12d0 [ 1406.274506] ? oom_killer_disable+0x280/0x280 [ 1406.274519] ? cgroup_file_notify+0x140/0x1b0 [ 1406.274543] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1406.274555] ? memcg_event_wake+0x230/0x230 [ 1406.274576] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1406.306479] ? cgroup_file_notify+0x140/0x1b0 [ 1406.310981] memory_max_write+0x169/0x300 [ 1406.315131] ? mem_cgroup_write+0x360/0x360 [ 1406.319877] ? lock_acquire+0x16f/0x3f0 [ 1406.323874] ? kernfs_fop_write+0x227/0x480 [ 1406.328627] cgroup_file_write+0x241/0x790 [ 1406.333140] ? mem_cgroup_write+0x360/0x360 [ 1406.337466] ? kill_css+0x380/0x380 [ 1406.341097] ? kill_css+0x380/0x380 [ 1406.344730] kernfs_fop_write+0x2b8/0x480 [ 1406.348900] __vfs_write+0x114/0x810 [ 1406.352621] ? kernfs_fop_open+0xd80/0xd80 [ 1406.356844] ? kernel_read+0x120/0x120 [ 1406.360726] ? __lock_is_held+0xb6/0x140 [ 1406.364829] ? rcu_read_lock_sched_held+0x110/0x130 [ 1406.369856] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1406.374617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1406.380157] ? __sb_start_write+0x1a9/0x360 [ 1406.384501] vfs_write+0x20c/0x560 [ 1406.388059] ksys_write+0x14f/0x2d0 [ 1406.391739] ? __ia32_sys_read+0xb0/0xb0 [ 1406.395803] ? do_syscall_64+0x26/0x620 [ 1406.399772] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.405139] ? do_syscall_64+0x26/0x620 [ 1406.409306] __x64_sys_write+0x73/0xb0 [ 1406.413215] do_syscall_64+0xfd/0x620 [ 1406.417030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.422331] RIP: 0033:0x459a29 [ 1406.425526] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1406.444443] RSP: 002b:00007f9ba28d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1406.452183] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 03:47:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000040)={0x20003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1406.459447] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1406.466721] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1406.474051] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba28d36d4 [ 1406.481341] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1406.499246] Task in /syz2 killed as a result of limit of /syz2 [ 1406.506580] memory: usage 3208kB, limit 0kB, failcnt 206 [ 1406.515306] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 03:47:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:10 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1406.557749] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1406.577745] Memory cgroup stats for /syz2: cache:156KB rss:2164KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2192KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1406.618502] Memory cgroup out of memory: Kill process 29831 (syz-executor.2) score 9274000 or sacrifice child 03:47:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfffffdf8, 0xe689c0faac51e2a9, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x20003}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1406.672653] Killed process 29831 (syz-executor.2) total-vm:72580kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB [ 1406.715229] oom_reaper: reaped process 29831 (syz-executor.2), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 03:47:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write(r2, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:47:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:10 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:10 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 03:47:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe28}], 0x1}}], 0x2, 0x0, 0x0) 03:47:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:10 executing program 3: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) init_module(&(0x7f00000000c0)='/dev/kvm\x00', 0x9, &(0x7f0000000100)='/dev/kvm\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x20003}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:47:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000003f00aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:47:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="e6ff302403000000c2bd82a686f1ff03000080a8c060ae9a4d1575b2b3a88dce2c0278169fb4347541be6e3eed7a188dd9d08b2d092e1d0b2c59f87f8d5dbc9e9f81b654951e3e1c0f36f98ee75eb9", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={r3, 0x2}, &(0x7f0000000100)=0x8) 03:47:10 executing program 3: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:11 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:11 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:47:11 executing program 3: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:47:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x1, &(0x7f0000000140)=0x3, 0x4) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) write$FUSE_BMAP(r5, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x8, {0x10001}}, 0x18) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x20003}) exit(0xfffffffffffffa45) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:48:10 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 03:48:10 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe30}], 0x1}}], 0x2, 0x0, 0x0) 03:48:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x44, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0xf0101, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x2) preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mem_hardwall\x00', 0x2, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x104080, 0x0) 03:48:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SMI(r4, 0xaeb7) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000040)={0x20003, 0x0, [0x0, 0x9, 0xbf, 0xda89, 0x0, 0x0, 0x0, 0xfffffffffffffffc]}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000100)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:48:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1467.210286] *** Guest State *** [ 1467.223894] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 03:48:11 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1467.257247] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 03:48:11 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1467.298246] CR3 = 0x0000000000000000 [ 1467.312500] RSP = 0x0000000000000000 RIP = 0x0000000000008000 [ 1467.334484] RFLAGS=0x00000102 DR7 = 0xfffffffffffffffc [ 1467.383452] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 03:48:11 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1467.427148] CS: sel=0x3000, attr=0x08093, limit=0xffffffff, base=0x0000000000030000 [ 1467.460254] DS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 03:48:11 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1467.479477] SS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 1467.534430] ES: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 03:48:11 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe800000000000000000ffffdd8600aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1467.578084] FS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 1467.604574] GS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 1467.620929] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 1467.630660] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 1467.640199] IDTR: limit=0x00000000, base=0x0000000000000000 [ 1467.674730] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 1467.711821] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 1467.745436] device bridge_slave_1 left promiscuous mode [ 1467.750983] bridge0: port 2(bridge_slave_1) entered disabled state [ 1467.781066] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 1467.804410] Interruptibility = 00000008 ActivityState = 00000000 [ 1467.811972] *** Host State *** [ 1467.818770] RIP = 0xffffffff811c9733 RSP = 0xffff88805492f8c0 [ 1467.826236] device bridge_slave_0 left promiscuous mode [ 1467.831750] bridge0: port 1(bridge_slave_0) entered disabled state [ 1467.845793] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 1467.860164] FSBase=00007f76f0c6f700 GSBase=ffff8880ae900000 TRBase=fffffe0000034000 [ 1467.877223] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 1467.891170] CR0=0000000080050033 CR3=000000008d848000 CR4=00000000001426e0 [ 1467.925948] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff87001400 [ 1467.956975] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 1468.020763] *** Control State *** [ 1468.041396] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 1468.122876] device hsr_slave_1 left promiscuous mode [ 1468.135857] EntryControls=0000d1ff ExitControls=002fefff [ 1468.163730] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 1468.190146] device hsr_slave_0 left promiscuous mode [ 1468.196157] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 1468.213174] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 1468.229695] reason=80000021 qualification=0000000000000000 [ 1468.240565] team0 (unregistering): Port device team_slave_1 removed [ 1468.244438] IDTVectoring: info=00000000 errcode=00000000 [ 1468.253083] TSC Offset = 0xfffffcec69bc89b2 [ 1468.263187] EPT pointer = 0x00000000a0b7501e [ 1468.273301] Virtual processor ID = 0x0001 [ 1468.301453] team0 (unregistering): Port device team_slave_0 removed [ 1468.354837] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1468.433387] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1468.537573] bond0 (unregistering): Released all slaves [ 1469.480963] IPVS: ftp: loaded support on port[0] = 21 [ 1469.573618] chnl_net:caif_netlink_parms(): no params data found [ 1469.632617] bridge0: port 1(bridge_slave_0) entered blocking state [ 1469.639504] bridge0: port 1(bridge_slave_0) entered disabled state [ 1469.647270] device bridge_slave_0 entered promiscuous mode [ 1469.654814] bridge0: port 2(bridge_slave_1) entered blocking state [ 1469.661267] bridge0: port 2(bridge_slave_1) entered disabled state [ 1469.668829] device bridge_slave_1 entered promiscuous mode [ 1469.688810] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1469.698351] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1469.718686] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1469.727275] team0: Port device team_slave_0 added [ 1469.733181] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1469.740919] team0: Port device team_slave_1 added [ 1469.746580] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1469.754151] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1469.816654] device hsr_slave_0 entered promiscuous mode [ 1469.854889] device hsr_slave_1 entered promiscuous mode [ 1469.895027] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1469.902537] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1469.918394] bridge0: port 2(bridge_slave_1) entered blocking state [ 1469.924828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1469.931435] bridge0: port 1(bridge_slave_0) entered blocking state [ 1469.937872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1469.976262] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1469.982371] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1469.991975] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1470.001923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1470.009795] bridge0: port 1(bridge_slave_0) entered disabled state [ 1470.016893] bridge0: port 2(bridge_slave_1) entered disabled state [ 1470.024095] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1470.034765] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1470.041051] 8021q: adding VLAN 0 to HW filter on device team0 [ 1470.052367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1470.060331] bridge0: port 1(bridge_slave_0) entered blocking state [ 1470.066895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1470.086260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1470.094194] bridge0: port 2(bridge_slave_1) entered blocking state [ 1470.100614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1470.108757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1470.117047] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1470.131832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1470.150196] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1470.158859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1470.171828] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1470.178689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1470.193403] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1470.207487] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1470.256565] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1470.268542] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1470.274001] CPU: 1 PID: 29960 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1470.280923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.290277] Call Trace: [ 1470.292953] dump_stack+0x172/0x1f0 [ 1470.296589] dump_header+0x15e/0xa55 [ 1470.300310] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1470.305437] ? ___ratelimit+0x60/0x595 [ 1470.309336] ? do_raw_spin_unlock+0x57/0x270 [ 1470.313766] oom_kill_process.cold+0x10/0x6ef [ 1470.318277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.323975] ? task_will_free_mem+0x139/0x6e0 [ 1470.328480] out_of_memory+0x936/0x12d0 [ 1470.332479] ? oom_killer_disable+0x280/0x280 [ 1470.336983] ? cgroup_file_notify+0x140/0x1b0 [ 1470.341519] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1470.346557] ? memcg_event_wake+0x230/0x230 [ 1470.350909] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1470.356035] ? cgroup_file_notify+0x140/0x1b0 [ 1470.360551] memory_max_write+0x169/0x300 [ 1470.364796] ? mem_cgroup_write+0x360/0x360 [ 1470.369133] ? lock_acquire+0x16f/0x3f0 [ 1470.373139] ? kernfs_fop_write+0x227/0x480 [ 1470.377490] cgroup_file_write+0x241/0x790 [ 1470.381741] ? mem_cgroup_write+0x360/0x360 [ 1470.386079] ? kill_css+0x380/0x380 [ 1470.389702] ? kill_css+0x380/0x380 [ 1470.393321] kernfs_fop_write+0x2b8/0x480 [ 1470.397461] __vfs_write+0x114/0x810 [ 1470.401163] ? kernfs_fop_open+0xd80/0xd80 [ 1470.405495] ? kernel_read+0x120/0x120 [ 1470.409378] ? __lock_is_held+0xb6/0x140 [ 1470.413436] ? rcu_read_lock_sched_held+0x110/0x130 [ 1470.418459] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1470.423227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.428763] ? __sb_start_write+0x1a9/0x360 [ 1470.433083] vfs_write+0x20c/0x560 [ 1470.436613] ksys_write+0x14f/0x2d0 [ 1470.440240] ? __ia32_sys_read+0xb0/0xb0 [ 1470.444293] ? do_syscall_64+0x26/0x620 [ 1470.448259] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.453611] ? do_syscall_64+0x26/0x620 [ 1470.457579] __x64_sys_write+0x73/0xb0 [ 1470.461456] do_syscall_64+0xfd/0x620 [ 1470.465248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.470426] RIP: 0033:0x459a29 [ 1470.473608] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1470.492553] RSP: 002b:00007fcf4b3c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1470.500298] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1470.507572] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1470.514921] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1470.522178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf4b3c26d4 [ 1470.529438] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1470.539285] Task in /syz2 killed as a result of limit of /syz2 [ 1470.545386] memory: usage 3160kB, limit 0kB, failcnt 271835 [ 1470.551110] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1470.558341] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1470.564692] Memory cgroup stats for /syz2: cache:156KB rss:2088KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1470.586441] Memory cgroup out of memory: Kill process 29959 (syz-executor.2) score 9272000 or sacrifice child [ 1470.596716] Killed process 29959 (syz-executor.2) total-vm:72584kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB 03:48:14 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 03:48:14 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:14 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe38}], 0x1}}], 0x2, 0x0, 0x0) 03:48:14 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x80, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0xc01, 0x0, 0x0, {{}, 0x0, 0x18}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000002c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, r3, 0x300, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2884}, 0x42f46f6f08124c22) r4 = syz_open_dev$media(&(0x7f0000000400)='/dev/media#\x00', 0x7, 0x8000) write$P9_RLINK(r4, &(0x7f0000000440)={0x7, 0x47, 0x2}, 0x7) r5 = socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) r6 = accept$alg(0xffffffffffffffff, 0x0, 0x0) listen(r6, 0x80000000) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$llc_int(r8, 0x10c, 0x7, &(0x7f00000004c0), &(0x7f0000000500)=0x4) preadv(r7, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$TIOCLINUX4(r7, 0x541c, &(0x7f0000000280)) write$USERIO_CMD_REGISTER(r4, &(0x7f0000000540)={0x0, 0x6}, 0x2) r9 = accept$alg(r5, 0x0, 0x0) write(r9, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000100)={0x4, 0x2, 0x62}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x80000001, 0xd7}, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r9, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:48:14 executing program 5: socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x8000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x100000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, &(0x7f0000001040)) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{}, "b26d585a0e72681c", "ea15067def60d496f8b5cdbd01fcee7d", "1a577a35", "b00dbc796b361e36"}, 0x28) syz_open_procfs(0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') readv(0xffffffffffffffff, &(0x7f0000000fc0)=[{&(0x7f0000000bc0)=""/245, 0xf5}, {&(0x7f0000000cc0)=""/146, 0x92}, {&(0x7f0000000d80)=""/228, 0xe4}, {&(0x7f00000002c0)=""/8, 0x8}, {&(0x7f0000000e80)=""/94, 0x5e}, {&(0x7f0000000f00)=""/154, 0x9a}], 0x6) [ 1470.608644] oom_reaper: reaped process 29959 (syz-executor.2), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 1470.654952] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1470.683143] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1470.695293] CPU: 0 PID: 29956 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1470.702275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.711647] Call Trace: [ 1470.714249] dump_stack+0x172/0x1f0 [ 1470.717894] dump_header+0x15e/0xa55 [ 1470.721620] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1470.726746] ? ___ratelimit+0x60/0x595 [ 1470.730648] ? do_raw_spin_unlock+0x57/0x270 [ 1470.735079] oom_kill_process.cold+0x10/0x6ef [ 1470.739597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.748109] ? task_will_free_mem+0x139/0x6e0 [ 1470.752632] out_of_memory+0x936/0x12d0 [ 1470.756635] ? lock_downgrade+0x810/0x810 [ 1470.760799] ? oom_killer_disable+0x280/0x280 [ 1470.765411] ? find_held_lock+0x35/0x130 [ 1470.769502] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1470.774579] ? memcg_event_wake+0x230/0x230 [ 1470.778935] ? do_raw_spin_unlock+0x57/0x270 [ 1470.783350] ? _raw_spin_unlock+0x2d/0x50 [ 1470.787498] try_charge+0xef7/0x1480 [ 1470.791209] ? find_held_lock+0x35/0x130 [ 1470.795270] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1470.800112] ? kasan_check_read+0x11/0x20 [ 1470.804272] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1470.809126] mem_cgroup_try_charge+0x259/0x6b0 [ 1470.813723] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1470.818748] wp_page_copy+0x430/0x16a0 [ 1470.822633] ? pmd_pfn+0x1d0/0x1d0 [ 1470.826176] ? kasan_check_read+0x11/0x20 [ 1470.830366] ? do_raw_spin_unlock+0x57/0x270 [ 1470.834864] do_wp_page+0x57d/0x10b0 [ 1470.838609] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1470.843276] ? kasan_check_write+0x14/0x20 [ 1470.847514] ? do_raw_spin_lock+0xc8/0x240 [ 1470.851764] __handle_mm_fault+0x2305/0x3f80 [ 1470.856184] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1470.861149] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1470.865842] handle_mm_fault+0x1b5/0x690 [ 1470.869938] __do_page_fault+0x62a/0xe90 [ 1470.874012] ? vmalloc_fault+0x740/0x740 [ 1470.878086] ? trace_hardirqs_off_caller+0x65/0x220 [ 1470.883103] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1470.888032] ? page_fault+0x8/0x30 [ 1470.891585] do_page_fault+0x71/0x57d [ 1470.895401] ? page_fault+0x8/0x30 [ 1470.898948] page_fault+0x1e/0x30 [ 1470.902565] RIP: 0033:0x430b06 [ 1470.905749] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1470.924803] RSP: 002b:00007ffed90774a0 EFLAGS: 00010206 [ 1470.930192] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1470.937455] RDX: 0000555555bc5930 RSI: 0000555555bcd970 RDI: 0000000000000003 [ 1470.944716] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555bc4940 03:48:14 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:14 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1470.951984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1470.959369] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1470.983063] Task in /syz2 killed as a result of limit of /syz2 [ 1471.001778] memory: usage 828kB, limit 0kB, failcnt 271843 [ 1471.015318] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1471.024210] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1471.043635] Memory cgroup stats for /syz2: cache:156KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1471.071781] Memory cgroup out of memory: Kill process 29956 (syz-executor.2) score 8757000 or sacrifice child [ 1471.082444] Killed process 29956 (syz-executor.2) total-vm:72452kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB 03:48:14 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000648800aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1471.101341] oom_reaper: reaped process 29956 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:48:14 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:14 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:14 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000280), 0x10) dup3(r0, r1, 0x0) 03:48:15 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 03:48:15 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe800000000000000000ffffca8800aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:48:15 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe40}], 0x1}}], 0x2, 0x0, 0x0) 03:48:15 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:15 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:15 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 03:48:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x9) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020907031dfffd944ef20c0020200a0009000500021d85680c1baba20400ff7e2800", 0x26}], 0x1}, 0x0) 03:48:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$UHID_INPUT(r1, &(0x7f0000001840)={0x8, "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", 0x1000}, 0x1006) r2 = accept$alg(r0, 0x0, 0x0) write(r2, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x227a, 0x0) kcmp(r3, r4, 0x0, r0, r5) userfaultfd(0x0) 03:48:15 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:15 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x481, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 03:48:15 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1471.911539] device bridge_slave_1 left promiscuous mode [ 1471.917633] bridge0: port 2(bridge_slave_1) entered disabled state 03:48:15 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1471.967899] device bridge_slave_0 left promiscuous mode [ 1471.975039] bridge0: port 1(bridge_slave_0) entered disabled state 03:48:15 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1472.337407] device hsr_slave_1 left promiscuous mode [ 1472.400264] device hsr_slave_0 left promiscuous mode 03:48:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe48}], 0x1}}], 0x2, 0x0, 0x0) 03:48:16 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:16 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1472.480538] team0 (unregistering): Port device team_slave_1 removed [ 1472.599251] team0 (unregistering): Port device team_slave_0 removed [ 1472.658648] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1472.770360] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1472.964354] bond0 (unregistering): Released all slaves [ 1474.107417] IPVS: ftp: loaded support on port[0] = 21 [ 1474.222664] chnl_net:caif_netlink_parms(): no params data found [ 1474.263343] bridge0: port 1(bridge_slave_0) entered blocking state [ 1474.269920] bridge0: port 1(bridge_slave_0) entered disabled state [ 1474.277116] device bridge_slave_0 entered promiscuous mode [ 1474.284386] bridge0: port 2(bridge_slave_1) entered blocking state [ 1474.290888] bridge0: port 2(bridge_slave_1) entered disabled state [ 1474.298232] device bridge_slave_1 entered promiscuous mode [ 1474.317272] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1474.327031] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1474.344699] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1474.352275] team0: Port device team_slave_0 added [ 1474.358208] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1474.366023] team0: Port device team_slave_1 added [ 1474.371416] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1474.379026] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1474.447443] device hsr_slave_0 entered promiscuous mode [ 1474.484668] device hsr_slave_1 entered promiscuous mode [ 1474.524980] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1474.532320] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1474.548548] bridge0: port 2(bridge_slave_1) entered blocking state [ 1474.554999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1474.561763] bridge0: port 1(bridge_slave_0) entered blocking state [ 1474.568380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1474.606973] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1474.613417] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1474.623036] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1474.632527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1474.641179] bridge0: port 1(bridge_slave_0) entered disabled state [ 1474.648613] bridge0: port 2(bridge_slave_1) entered disabled state [ 1474.656693] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1474.668063] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1474.674166] 8021q: adding VLAN 0 to HW filter on device team0 [ 1474.684605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1474.692253] bridge0: port 1(bridge_slave_0) entered blocking state [ 1474.698665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1474.711215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1474.719025] bridge0: port 2(bridge_slave_1) entered blocking state [ 1474.725440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1474.746074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1474.756052] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1474.763965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1474.772171] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1474.786802] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1474.798137] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1474.805227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1474.812859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1474.825794] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1474.842585] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1474.953042] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1474.965611] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1474.971330] CPU: 1 PID: 30059 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1474.978259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1474.987710] Call Trace: [ 1474.990316] dump_stack+0x172/0x1f0 [ 1474.993946] dump_header+0x15e/0xa55 [ 1474.997675] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1475.002783] ? ___ratelimit+0x60/0x595 [ 1475.006751] ? do_raw_spin_unlock+0x57/0x270 [ 1475.011154] oom_kill_process.cold+0x10/0x6ef [ 1475.015649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1475.021266] ? task_will_free_mem+0x139/0x6e0 [ 1475.025768] out_of_memory+0x936/0x12d0 [ 1475.029764] ? oom_killer_disable+0x280/0x280 [ 1475.034291] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1475.039128] ? memcg_event_wake+0x230/0x230 [ 1475.043573] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1475.048792] ? cgroup_file_notify+0x140/0x1b0 [ 1475.053303] memory_max_write+0x169/0x300 [ 1475.057461] ? mem_cgroup_write+0x360/0x360 [ 1475.061792] ? mem_cgroup_write+0x360/0x360 [ 1475.066204] cgroup_file_write+0x241/0x790 [ 1475.070437] ? mem_cgroup_write+0x360/0x360 [ 1475.074834] ? kill_css+0x380/0x380 [ 1475.078571] ? kill_css+0x380/0x380 [ 1475.082189] kernfs_fop_write+0x2b8/0x480 [ 1475.086334] __vfs_write+0x114/0x810 [ 1475.090041] ? kernfs_fop_open+0xd80/0xd80 [ 1475.094280] ? kernel_read+0x120/0x120 [ 1475.098164] ? __lock_is_held+0xb6/0x140 [ 1475.102224] ? rcu_read_lock_sched_held+0x110/0x130 [ 1475.107231] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1475.112164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1475.118150] ? __sb_start_write+0x1a9/0x360 [ 1475.122528] vfs_write+0x20c/0x560 [ 1475.126066] ksys_write+0x14f/0x2d0 [ 1475.129686] ? __ia32_sys_read+0xb0/0xb0 [ 1475.133743] ? do_syscall_64+0x26/0x620 [ 1475.137715] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1475.143066] ? do_syscall_64+0x26/0x620 [ 1475.147051] __x64_sys_write+0x73/0xb0 [ 1475.150944] do_syscall_64+0xfd/0x620 [ 1475.154768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1475.160052] RIP: 0033:0x459a29 [ 1475.163269] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1475.182607] RSP: 002b:00007fd03c745c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1475.190316] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1475.197595] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1475.204879] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1475.212364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd03c7466d4 [ 1475.219654] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1475.243139] Task in /syz2 killed as a result of limit of /syz2 [ 1475.250071] memory: usage 3232kB, limit 0kB, failcnt 271844 [ 1475.257571] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1475.265204] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1475.272022] Memory cgroup stats for /syz2: cache:156KB rss:2168KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2176KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1475.293854] Memory cgroup out of memory: Kill process 30058 (syz-executor.2) score 9273000 or sacrifice child 03:48:19 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:19 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000480)={0x1, &(0x7f0000000040)=[{}]}) 03:48:19 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1475.304569] Killed process 30058 (syz-executor.2) total-vm:72584kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 1475.318773] oom_reaper: reaped process 30058 (syz-executor.2), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 03:48:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000640)={0x8e1e}) r2 = accept$alg(r0, 0x0, 0x0) write(r2, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:48:19 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe50}], 0x1}}], 0x2, 0x0, 0x0) [ 1475.351662] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 03:48:19 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:19 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1475.411740] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1475.430932] CPU: 1 PID: 30055 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1475.438002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1475.447372] Call Trace: [ 1475.449974] dump_stack+0x172/0x1f0 [ 1475.453648] dump_header+0x15e/0xa55 [ 1475.457386] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1475.462529] ? ___ratelimit+0x60/0x595 [ 1475.466440] ? do_raw_spin_unlock+0x57/0x270 [ 1475.470874] oom_kill_process.cold+0x10/0x6ef [ 1475.475389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1475.480946] ? task_will_free_mem+0x139/0x6e0 [ 1475.485578] out_of_memory+0x936/0x12d0 [ 1475.489561] ? lock_downgrade+0x810/0x810 [ 1475.493728] ? oom_killer_disable+0x280/0x280 [ 1475.498240] ? find_held_lock+0x35/0x130 [ 1475.502334] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1475.507192] ? memcg_event_wake+0x230/0x230 03:48:19 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:19 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, 0x0) 03:48:19 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1475.511538] ? do_raw_spin_unlock+0x57/0x270 [ 1475.515993] ? _raw_spin_unlock+0x2d/0x50 [ 1475.520245] try_charge+0xef7/0x1480 [ 1475.523979] ? find_held_lock+0x35/0x130 [ 1475.528170] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1475.533032] ? kasan_check_read+0x11/0x20 [ 1475.537198] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1475.542061] mem_cgroup_try_charge+0x259/0x6b0 [ 1475.546672] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1475.551614] wp_page_copy+0x430/0x16a0 [ 1475.555517] ? pmd_pfn+0x1d0/0x1d0 [ 1475.559183] ? kasan_check_read+0x11/0x20 [ 1475.563353] ? do_raw_spin_unlock+0x57/0x270 [ 1475.568326] do_wp_page+0x57d/0x10b0 [ 1475.572147] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1475.577353] ? kasan_check_write+0x14/0x20 [ 1475.581615] ? do_raw_spin_lock+0xc8/0x240 [ 1475.585872] __handle_mm_fault+0x2305/0x3f80 [ 1475.590304] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1475.595274] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1475.600839] handle_mm_fault+0x1b5/0x690 [ 1475.604927] __do_page_fault+0x62a/0xe90 [ 1475.609023] ? vmalloc_fault+0x740/0x740 [ 1475.613104] ? trace_hardirqs_off_caller+0x65/0x220 [ 1475.618159] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1475.623110] ? page_fault+0x8/0x30 [ 1475.626675] do_page_fault+0x71/0x57d [ 1475.630627] ? page_fault+0x8/0x30 [ 1475.634186] page_fault+0x1e/0x30 [ 1475.637646] RIP: 0033:0x430b06 [ 1475.640851] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 03:48:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000480)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x200000000010, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ffd00e00000000000000030501000b000100040423ca0000cf", 0x191) [ 1475.659786] RSP: 002b:00007ffe2d6d3790 EFLAGS: 00010206 [ 1475.665438] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1475.672731] RDX: 0000555556f62930 RSI: 0000555556f6a970 RDI: 0000000000000003 [ 1475.680016] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556f61940 [ 1475.687300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1475.694588] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1475.710689] Task in /syz2 killed as a result of limit of /syz2 [ 1475.737013] memory: usage 892kB, limit 0kB, failcnt 271852 [ 1475.757494] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1475.767549] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1475.773865] Memory cgroup stats for /syz2: cache:156KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1475.808162] Memory cgroup out of memory: Kill process 30055 (syz-executor.2) score 8758000 or sacrifice child [ 1475.822026] Killed process 30055 (syz-executor.2) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 1475.833812] oom_reaper: reaped process 30055 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 03:48:19 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:19 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:19 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:20 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:20 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x1000, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0xa, @win={{0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 03:48:20 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:20 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe58}], 0x1}}], 0x2, 0x0, 0x0) 03:48:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x100, 0x80000) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_init_net_socket$netrom(0x6, 0x5, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r3, 0x89e0, &(0x7f0000000180)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r4}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:48:20 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:48:20 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:20 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1476.565361] device bridge_slave_1 left promiscuous mode [ 1476.570912] bridge0: port 2(bridge_slave_1) entered disabled state 03:48:20 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:20 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1476.655507] device bridge_slave_0 left promiscuous mode [ 1476.662373] bridge0: port 1(bridge_slave_0) entered disabled state 03:48:20 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:20 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:20 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1476.970030] device hsr_slave_1 left promiscuous mode [ 1477.051622] device hsr_slave_0 left promiscuous mode [ 1477.103847] team0 (unregistering): Port device team_slave_1 removed [ 1477.148972] team0 (unregistering): Port device team_slave_0 removed [ 1477.211991] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1477.273803] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1477.497315] bond0 (unregistering): Released all slaves [ 1478.571664] IPVS: ftp: loaded support on port[0] = 21 [ 1478.652988] chnl_net:caif_netlink_parms(): no params data found [ 1478.694576] bridge0: port 1(bridge_slave_0) entered blocking state [ 1478.701066] bridge0: port 1(bridge_slave_0) entered disabled state [ 1478.708693] device bridge_slave_0 entered promiscuous mode [ 1478.716190] bridge0: port 2(bridge_slave_1) entered blocking state [ 1478.722811] bridge0: port 2(bridge_slave_1) entered disabled state [ 1478.730678] device bridge_slave_1 entered promiscuous mode [ 1478.752237] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1478.762093] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1478.788183] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1478.796071] team0: Port device team_slave_0 added [ 1478.801992] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1478.809772] team0: Port device team_slave_1 added [ 1478.815279] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1478.823047] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1478.876661] device hsr_slave_0 entered promiscuous mode [ 1478.934780] device hsr_slave_1 entered promiscuous mode [ 1478.974944] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1478.982029] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1478.998831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1479.005472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1479.012080] bridge0: port 1(bridge_slave_0) entered blocking state [ 1479.018654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1479.059213] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1479.066069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1479.075518] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1479.085987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1479.093778] bridge0: port 1(bridge_slave_0) entered disabled state [ 1479.100874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1479.108820] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1479.119962] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1479.127440] 8021q: adding VLAN 0 to HW filter on device team0 [ 1479.138972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1479.147358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1479.153989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1479.165120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1479.172765] bridge0: port 2(bridge_slave_1) entered blocking state [ 1479.179194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1479.198311] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1479.207612] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1479.222016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1479.236937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1479.249334] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1479.261114] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1479.267619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1479.276350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1479.292044] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1479.304942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1479.417607] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1479.430663] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1479.437027] CPU: 0 PID: 30150 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1479.443967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1479.453313] Call Trace: [ 1479.455909] dump_stack+0x172/0x1f0 [ 1479.459556] dump_header+0x15e/0xa55 [ 1479.463269] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1479.468378] ? ___ratelimit+0x60/0x595 [ 1479.472346] ? do_raw_spin_unlock+0x57/0x270 [ 1479.476816] oom_kill_process.cold+0x10/0x6ef [ 1479.481329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1479.487022] ? task_will_free_mem+0x139/0x6e0 [ 1479.491623] out_of_memory+0x936/0x12d0 [ 1479.495703] ? oom_killer_disable+0x280/0x280 [ 1479.500348] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1479.505235] ? memcg_event_wake+0x230/0x230 [ 1479.509605] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1479.514713] ? cgroup_file_notify+0x140/0x1b0 [ 1479.519318] memory_max_write+0x169/0x300 [ 1479.523465] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1479.528266] ? mem_cgroup_write+0x360/0x360 [ 1479.532597] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1479.537527] cgroup_file_write+0x241/0x790 [ 1479.541846] ? mem_cgroup_write+0x360/0x360 [ 1479.546278] ? kill_css+0x380/0x380 [ 1479.549916] ? kill_css+0x380/0x380 [ 1479.553605] kernfs_fop_write+0x2b8/0x480 [ 1479.557769] __vfs_write+0x114/0x810 [ 1479.561476] ? kernfs_fop_open+0xd80/0xd80 [ 1479.565713] ? kernel_read+0x120/0x120 [ 1479.569608] ? __lock_is_held+0xb6/0x140 [ 1479.573663] ? rcu_read_lock_sched_held+0x110/0x130 [ 1479.578704] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1479.583615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1479.589154] ? __sb_start_write+0x1a9/0x360 [ 1479.593470] vfs_write+0x20c/0x560 [ 1479.597040] ksys_write+0x14f/0x2d0 [ 1479.600666] ? __ia32_sys_read+0xb0/0xb0 [ 1479.604728] ? do_syscall_64+0x26/0x620 [ 1479.608707] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1479.614063] ? do_syscall_64+0x26/0x620 [ 1479.618045] __x64_sys_write+0x73/0xb0 [ 1479.621931] do_syscall_64+0xfd/0x620 [ 1479.625745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1479.630935] RIP: 0033:0x459a29 [ 1479.634119] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1479.653194] RSP: 002b:00007fd9a3154c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1479.660914] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1479.668184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1479.675452] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1479.682727] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9a31556d4 [ 1479.689993] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1479.701754] Task in /syz2 killed as a result of limit of /syz2 [ 1479.708986] memory: usage 3240kB, limit 0kB, failcnt 271853 [ 1479.715468] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1479.722732] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1479.729675] Memory cgroup stats for /syz2: cache:156KB rss:2208KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1479.751845] Memory cgroup out of memory: Kill process 30149 (syz-executor.2) score 9272000 or sacrifice child 03:48:23 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:23 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:23 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe60}], 0x1}}], 0x2, 0x0, 0x0) 03:48:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x0, 0x40012003, 0x0) 03:48:23 executing program 5: r0 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05604, &(0x7f0000000340)={0x2}) [ 1479.762746] Killed process 30149 (syz-executor.2) total-vm:72584kB, anon-rss:2180kB, file-rss:35808kB, shmem-rss:0kB [ 1479.777656] oom_reaper: reaped process 30149 (syz-executor.2), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 1479.801861] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1479.826303] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1479.858848] CPU: 1 PID: 30146 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1479.865839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1479.875209] Call Trace: [ 1479.877817] dump_stack+0x172/0x1f0 [ 1479.881469] dump_header+0x15e/0xa55 [ 1479.885197] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1479.890318] ? ___ratelimit+0x60/0x595 [ 1479.894229] ? do_raw_spin_unlock+0x57/0x270 [ 1479.898668] oom_kill_process.cold+0x10/0x6ef [ 1479.903190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1479.908754] ? task_will_free_mem+0x139/0x6e0 [ 1479.913271] out_of_memory+0x936/0x12d0 [ 1479.917258] ? lock_downgrade+0x810/0x810 [ 1479.921425] ? oom_killer_disable+0x280/0x280 [ 1479.925934] ? find_held_lock+0x35/0x130 [ 1479.930026] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1479.934897] ? memcg_event_wake+0x230/0x230 [ 1479.939244] ? do_raw_spin_unlock+0x57/0x270 [ 1479.943688] ? _raw_spin_unlock+0x2d/0x50 [ 1479.947916] try_charge+0xef7/0x1480 [ 1479.951744] ? find_held_lock+0x35/0x130 03:48:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@codepage={'codepage', 0x3d, 'cp857'}}], [{@smackfshat={'smackfshat', 0x3d, '/dev/kvm\x00'}}]}) 03:48:23 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1479.955832] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1479.960700] ? kasan_check_read+0x11/0x20 [ 1479.964870] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1479.969725] mem_cgroup_try_charge+0x259/0x6b0 [ 1479.974350] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1479.979306] wp_page_copy+0x430/0x16a0 [ 1479.983226] ? pmd_pfn+0x1d0/0x1d0 [ 1479.986793] ? kasan_check_read+0x11/0x20 [ 1479.990967] ? do_raw_spin_unlock+0x57/0x270 [ 1479.995410] do_wp_page+0x57d/0x10b0 [ 1479.999174] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1480.004122] ? kasan_check_write+0x14/0x20 03:48:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x2) 03:48:23 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1480.008392] ? do_raw_spin_lock+0xc8/0x240 [ 1480.012672] __handle_mm_fault+0x2305/0x3f80 [ 1480.017121] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1480.022095] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1480.026794] handle_mm_fault+0x1b5/0x690 [ 1480.030887] __do_page_fault+0x62a/0xe90 [ 1480.034981] ? vmalloc_fault+0x740/0x740 [ 1480.039061] ? trace_hardirqs_off_caller+0x65/0x220 [ 1480.044094] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1480.049047] ? page_fault+0x8/0x30 [ 1480.052626] do_page_fault+0x71/0x57d [ 1480.056464] ? page_fault+0x8/0x30 03:48:23 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000006000000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1480.060029] page_fault+0x1e/0x30 [ 1480.063510] RIP: 0033:0x430b06 [ 1480.066718] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1480.085808] RSP: 002b:00007ffffb214440 EFLAGS: 00010206 [ 1480.091194] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1480.098477] RDX: 0000555556be5930 RSI: 0000555556bed970 RDI: 0000000000000003 03:48:23 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1480.105771] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556be4940 [ 1480.113052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1480.120341] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1480.163416] Task in /syz2 killed as a result of limit of /syz2 [ 1480.224554] memory: usage 908kB, limit 0kB, failcnt 271861 [ 1480.230358] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1480.249872] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1480.263891] Memory cgroup stats for /syz2: cache:156KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1480.294126] Memory cgroup out of memory: Kill process 30146 (syz-executor.2) score 8757000 or sacrifice child [ 1480.308146] Killed process 30146 (syz-executor.2) total-vm:72452kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB 03:48:24 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:24 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:24 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe68}], 0x1}}], 0x2, 0x0, 0x0) 03:48:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r3 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x7, 0x4000) setsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000180)="faecfe78bf848cfe63a7ee156c914c9eb351f747d38f4ee7bcd7fbace0e38d0cbaa01a176365d1ff6e4a30a910760f239a8267e2800e6d7a686390fd8fe5a43dbfcb9e07e79efc557b30f3f3b0dfa03e73029649f05e08251db0cda42ac210398e062b2ca737d5db2579bf108363c6c20f415a0d56a1815452c2c78259fe3af416d89ef4667465a5afaeb7cac8787e5b40d442f9725c4124c5608c19cec75468", 0xa0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000001840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x8000, 0x100) connect$vsock_stream(r4, &(0x7f0000000280)={0x28, 0x0, 0x2710, @reserved}, 0x10) 03:48:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x2) 03:48:24 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000008000000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:48:24 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:24 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:24 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:24 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="03"], 0x1) fsync(r1) fallocate(r1, 0x0, 0x40000, 0xfff) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 1480.985573] device bridge_slave_1 left promiscuous mode [ 1481.011291] bridge0: port 2(bridge_slave_1) entered disabled state 03:48:24 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:24 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1481.098398] device bridge_slave_0 left promiscuous mode [ 1481.106274] bridge0: port 1(bridge_slave_0) entered disabled state 03:48:25 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1481.333219] audit: type=1800 audit(2000000905.050:158): pid=30213 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17341 res=0 [ 1481.492281] device hsr_slave_1 left promiscuous mode [ 1481.552160] device hsr_slave_0 left promiscuous mode [ 1481.611977] team0 (unregistering): Port device team_slave_1 removed [ 1481.643914] team0 (unregistering): Port device team_slave_0 removed 03:48:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe70}], 0x1}}], 0x2, 0x0, 0x0) [ 1481.701791] bond0 (unregistering): Releasing backup interface bond_slave_1 03:48:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x4010, r1, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000000c0)=0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r3, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:48:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x5, 0x5, 0xe009}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 03:48:25 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1481.763063] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1481.973681] bond0 (unregistering): Released all slaves [ 1483.170941] IPVS: ftp: loaded support on port[0] = 21 [ 1483.244602] chnl_net:caif_netlink_parms(): no params data found [ 1483.285519] bridge0: port 1(bridge_slave_0) entered blocking state [ 1483.292135] bridge0: port 1(bridge_slave_0) entered disabled state [ 1483.299707] device bridge_slave_0 entered promiscuous mode [ 1483.307294] bridge0: port 2(bridge_slave_1) entered blocking state [ 1483.313740] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.321095] device bridge_slave_1 entered promiscuous mode [ 1483.338814] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1483.348210] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1483.367343] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1483.374997] team0: Port device team_slave_0 added [ 1483.380662] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1483.389217] team0: Port device team_slave_1 added [ 1483.395611] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1483.403162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1483.466638] device hsr_slave_0 entered promiscuous mode [ 1483.524755] device hsr_slave_1 entered promiscuous mode [ 1483.564961] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1483.572075] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1483.590383] bridge0: port 2(bridge_slave_1) entered blocking state [ 1483.597013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1483.603620] bridge0: port 1(bridge_slave_0) entered blocking state [ 1483.610037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1483.648350] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1483.654862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1483.663536] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1483.673710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1483.681547] bridge0: port 1(bridge_slave_0) entered disabled state [ 1483.689402] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.696861] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1483.708945] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1483.715767] 8021q: adding VLAN 0 to HW filter on device team0 [ 1483.726884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1483.735133] bridge0: port 1(bridge_slave_0) entered blocking state [ 1483.741502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1483.765332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1483.773120] bridge0: port 2(bridge_slave_1) entered blocking state [ 1483.779647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1483.787161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1483.796705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1483.807156] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1483.814559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1483.825919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1483.836009] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1483.842155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1483.859121] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1483.870401] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1483.920976] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1483.932284] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1483.938319] CPU: 1 PID: 30253 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1483.945390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1483.954761] Call Trace: [ 1483.957361] dump_stack+0x172/0x1f0 [ 1483.960998] dump_header+0x15e/0xa55 [ 1483.964736] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1483.969859] ? ___ratelimit+0x60/0x595 [ 1483.973762] ? do_raw_spin_unlock+0x57/0x270 [ 1483.978179] oom_kill_process.cold+0x10/0x6ef [ 1483.982700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1483.988266] ? task_will_free_mem+0x139/0x6e0 [ 1483.992787] out_of_memory+0x936/0x12d0 [ 1483.997066] ? oom_killer_disable+0x280/0x280 [ 1484.001585] ? cgroup_file_notify+0x140/0x1b0 [ 1484.006110] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1484.010984] ? memcg_event_wake+0x230/0x230 [ 1484.015330] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1484.020475] ? cgroup_file_notify+0x140/0x1b0 [ 1484.025198] memory_max_write+0x169/0x300 [ 1484.029385] ? mem_cgroup_write+0x360/0x360 [ 1484.033798] ? lock_acquire+0x16f/0x3f0 [ 1484.037795] ? kernfs_fop_write+0x227/0x480 [ 1484.042138] cgroup_file_write+0x241/0x790 [ 1484.046516] ? mem_cgroup_write+0x360/0x360 [ 1484.050842] ? kill_css+0x380/0x380 [ 1484.054684] ? kill_css+0x380/0x380 [ 1484.058318] kernfs_fop_write+0x2b8/0x480 [ 1484.062465] __vfs_write+0x114/0x810 [ 1484.066353] ? kernfs_fop_open+0xd80/0xd80 [ 1484.070593] ? kernel_read+0x120/0x120 [ 1484.074480] ? __lock_is_held+0xb6/0x140 [ 1484.078678] ? rcu_read_lock_sched_held+0x110/0x130 [ 1484.083810] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1484.088571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1484.094116] ? __sb_start_write+0x1a9/0x360 [ 1484.098444] vfs_write+0x20c/0x560 [ 1484.101998] ksys_write+0x14f/0x2d0 [ 1484.105668] ? __ia32_sys_read+0xb0/0xb0 [ 1484.109734] ? do_syscall_64+0x26/0x620 [ 1484.113712] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1484.119081] ? do_syscall_64+0x26/0x620 [ 1484.123064] __x64_sys_write+0x73/0xb0 [ 1484.126947] do_syscall_64+0xfd/0x620 [ 1484.130748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1484.135941] RIP: 0033:0x459a29 [ 1484.139125] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1484.158125] RSP: 002b:00007fce23269c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1484.165838] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1484.173103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1484.180369] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1484.187631] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce2326a6d4 [ 1484.194985] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1484.211234] Task in /syz2 killed as a result of limit of /syz2 [ 1484.217710] memory: usage 3232kB, limit 0kB, failcnt 271862 [ 1484.223590] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1484.231826] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1484.239914] Memory cgroup stats for /syz2: cache:156KB rss:2108KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1484.262023] Memory cgroup out of memory: Kill process 30252 (syz-executor.2) score 9273000 or sacrifice child 03:48:28 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:28 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:28 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) 03:48:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0), 0x40000000000020e, 0x60012110, 0x0) 03:48:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe78}], 0x1}}], 0x2, 0x0, 0x0) [ 1484.273662] Killed process 30252 (syz-executor.2) total-vm:72584kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 1484.285636] oom_reaper: reaped process 30252 (syz-executor.2), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 1484.329332] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1484.348099] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1484.358982] CPU: 1 PID: 30249 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1484.365962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1484.375426] Call Trace: [ 1484.378022] dump_stack+0x172/0x1f0 [ 1484.381653] dump_header+0x15e/0xa55 [ 1484.385372] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1484.390557] ? ___ratelimit+0x60/0x595 [ 1484.394435] ? do_raw_spin_unlock+0x57/0x270 [ 1484.398836] oom_kill_process.cold+0x10/0x6ef [ 1484.403324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1484.408852] ? task_will_free_mem+0x139/0x6e0 [ 1484.413344] out_of_memory+0x936/0x12d0 [ 1484.417318] ? lock_downgrade+0x810/0x810 [ 1484.422037] ? oom_killer_disable+0x280/0x280 [ 1484.426674] ? find_held_lock+0x35/0x130 [ 1484.430736] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1484.435569] ? memcg_event_wake+0x230/0x230 [ 1484.439892] ? do_raw_spin_unlock+0x57/0x270 [ 1484.444308] ? _raw_spin_unlock+0x2d/0x50 [ 1484.448450] try_charge+0xef7/0x1480 [ 1484.452166] ? find_held_lock+0x35/0x130 [ 1484.456223] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1484.461077] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1484.465915] mem_cgroup_try_charge+0x259/0x6b0 [ 1484.470494] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1484.475429] wp_page_copy+0x430/0x16a0 [ 1484.479835] ? pmd_pfn+0x1d0/0x1d0 [ 1484.483406] ? kasan_check_read+0x11/0x20 [ 1484.487559] ? do_raw_spin_unlock+0x57/0x270 [ 1484.491961] do_wp_page+0x57d/0x10b0 [ 1484.495674] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1484.500336] ? kasan_check_write+0x14/0x20 [ 1484.504565] ? do_raw_spin_lock+0xc8/0x240 [ 1484.508800] __handle_mm_fault+0x2305/0x3f80 [ 1484.513205] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1484.518050] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1484.523331] handle_mm_fault+0x1b5/0x690 [ 1484.527423] __do_page_fault+0x62a/0xe90 [ 1484.531477] ? vmalloc_fault+0x740/0x740 [ 1484.535534] ? trace_hardirqs_off_caller+0x65/0x220 [ 1484.540540] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1484.545471] ? page_fault+0x8/0x30 [ 1484.549005] do_page_fault+0x71/0x57d [ 1484.552799] ? page_fault+0x8/0x30 [ 1484.556414] page_fault+0x1e/0x30 [ 1484.559871] RIP: 0033:0x430b06 [ 1484.563055] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1484.582123] RSP: 002b:00007ffc16313340 EFLAGS: 00010206 [ 1484.587483] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1484.594744] RDX: 0000555555992930 RSI: 000055555599a970 RDI: 0000000000000003 [ 1484.602005] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555991940 [ 1484.609369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1484.618304] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 03:48:28 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:28 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000028000000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1484.659305] Task in /syz2 killed as a result of limit of /syz2 [ 1484.669717] memory: usage 900kB, limit 0kB, failcnt 271870 [ 1484.676416] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1484.688612] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1484.727789] Memory cgroup stats for /syz2: cache:156KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB 03:48:28 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:28 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000030000000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1484.779908] Memory cgroup out of memory: Kill process 30249 (syz-executor.2) score 8758000 or sacrifice child [ 1484.790565] Killed process 30249 (syz-executor.2) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 1484.810845] oom_reaper: reaped process 30249 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 03:48:28 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:28 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:28 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfd77e4ef05f7e1, 0x0, 0x0, 0x35a) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x42, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:48:28 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:28 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:29 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe80}], 0x1}}], 0x2, 0x0, 0x0) 03:48:29 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f00000000c0)) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='nv\x00', 0x3) 03:48:29 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe80000000000000000000f0000000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:48:29 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:29 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1485.595633] device bridge_slave_1 left promiscuous mode [ 1485.601212] bridge0: port 2(bridge_slave_1) entered disabled state 03:48:29 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1485.675539] device bridge_slave_0 left promiscuous mode [ 1485.685310] bridge0: port 1(bridge_slave_0) entered disabled state 03:48:29 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1486.032292] device hsr_slave_1 left promiscuous mode [ 1486.093794] device hsr_slave_0 left promiscuous mode [ 1486.168830] team0 (unregistering): Port device team_slave_1 removed [ 1486.206300] team0 (unregistering): Port device team_slave_0 removed [ 1486.218521] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1486.289678] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1486.453837] bond0 (unregistering): Released all slaves 03:48:30 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1487.493014] IPVS: ftp: loaded support on port[0] = 21 [ 1487.615189] chnl_net:caif_netlink_parms(): no params data found [ 1487.649141] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.656209] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.663665] device bridge_slave_0 entered promiscuous mode [ 1487.670889] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.677708] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.685419] device bridge_slave_1 entered promiscuous mode [ 1487.702070] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1487.711887] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1487.730423] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1487.738099] team0: Port device team_slave_0 added [ 1487.744056] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1487.751663] team0: Port device team_slave_1 added [ 1487.757260] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1487.765617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1487.827620] device hsr_slave_0 entered promiscuous mode [ 1487.864795] device hsr_slave_1 entered promiscuous mode [ 1487.905221] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1487.912744] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1487.929026] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.935482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1487.942292] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.948731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1487.987823] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1487.994038] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1488.003099] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1488.013945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1488.022213] bridge0: port 1(bridge_slave_0) entered disabled state [ 1488.029852] bridge0: port 2(bridge_slave_1) entered disabled state [ 1488.037905] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1488.049802] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1488.056296] 8021q: adding VLAN 0 to HW filter on device team0 [ 1488.066849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1488.075010] bridge0: port 1(bridge_slave_0) entered blocking state [ 1488.081387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1488.094741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1488.102402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1488.108851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1488.125818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1488.134001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1488.142963] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1488.159369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1488.170756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1488.182327] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1488.189085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1488.202029] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1488.218104] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1488.273299] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1488.285828] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1488.291371] CPU: 0 PID: 30336 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1488.298315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.307856] Call Trace: [ 1488.310440] dump_stack+0x172/0x1f0 [ 1488.314083] dump_header+0x15e/0xa55 [ 1488.317820] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1488.322953] ? ___ratelimit+0x60/0x595 [ 1488.326854] ? do_raw_spin_unlock+0x57/0x270 [ 1488.331275] oom_kill_process.cold+0x10/0x6ef [ 1488.335785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1488.341348] ? task_will_free_mem+0x139/0x6e0 [ 1488.345949] out_of_memory+0x936/0x12d0 [ 1488.349943] ? oom_killer_disable+0x280/0x280 [ 1488.354438] ? cgroup_file_notify+0x140/0x1b0 [ 1488.358948] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1488.363833] ? memcg_event_wake+0x230/0x230 [ 1488.368193] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1488.373293] ? cgroup_file_notify+0x140/0x1b0 [ 1488.377788] memory_max_write+0x169/0x300 [ 1488.381956] ? mem_cgroup_write+0x360/0x360 [ 1488.386379] ? lock_acquire+0x16f/0x3f0 [ 1488.390353] ? kernfs_fop_write+0x227/0x480 [ 1488.394686] cgroup_file_write+0x241/0x790 [ 1488.398927] ? mem_cgroup_write+0x360/0x360 [ 1488.403267] ? kill_css+0x380/0x380 [ 1488.406914] ? kill_css+0x380/0x380 [ 1488.410560] kernfs_fop_write+0x2b8/0x480 [ 1488.414726] __vfs_write+0x114/0x810 [ 1488.418444] ? kernfs_fop_open+0xd80/0xd80 [ 1488.422689] ? kernel_read+0x120/0x120 [ 1488.426587] ? __lock_is_held+0xb6/0x140 [ 1488.430657] ? rcu_read_lock_sched_held+0x110/0x130 [ 1488.435680] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1488.440494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1488.446039] ? __sb_start_write+0x1a9/0x360 [ 1488.450369] vfs_write+0x20c/0x560 [ 1488.453912] ksys_write+0x14f/0x2d0 [ 1488.457562] ? __ia32_sys_read+0xb0/0xb0 [ 1488.461631] ? do_syscall_64+0x26/0x620 [ 1488.465608] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1488.470973] ? do_syscall_64+0x26/0x620 [ 1488.474952] __x64_sys_write+0x73/0xb0 [ 1488.479038] do_syscall_64+0xfd/0x620 [ 1488.483028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1488.488216] RIP: 0033:0x459a29 [ 1488.491420] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1488.510323] RSP: 002b:00007fd2f2179c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1488.518403] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1488.525807] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1488.533084] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1488.540360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd2f217a6d4 [ 1488.547693] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1488.556063] Task in /syz2 killed as a result of limit of /syz2 [ 1488.562193] memory: usage 3244kB, limit 0kB, failcnt 271871 [ 1488.568087] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1488.575509] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1488.581801] Memory cgroup stats for /syz2: cache:156KB rss:2140KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2164KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1488.602767] Memory cgroup out of memory: Kill process 30335 (syz-executor.2) score 9273000 or sacrifice child [ 1488.613190] Killed process 30335 (syz-executor.2) total-vm:72584kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB 03:48:32 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:32 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe88}], 0x1}}], 0x2, 0x0, 0x0) 03:48:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/243, 0xf3}], 0x1, 0x4d) 03:48:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r2}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r2, 0x1, 0x10}, 0xc) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write(r3, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r3, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:48:32 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1488.625475] oom_reaper: reaped process 30335 (syz-executor.2), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 1488.653653] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1488.729410] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1488.748600] CPU: 1 PID: 30332 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1488.755573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.765125] Call Trace: [ 1488.767748] dump_stack+0x172/0x1f0 [ 1488.771409] dump_header+0x15e/0xa55 03:48:32 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1488.775160] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1488.781252] ? ___ratelimit+0x60/0x595 [ 1488.785168] ? do_raw_spin_unlock+0x57/0x270 [ 1488.789700] oom_kill_process.cold+0x10/0x6ef [ 1488.794227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1488.799790] ? task_will_free_mem+0x139/0x6e0 [ 1488.804395] out_of_memory+0x936/0x12d0 [ 1488.804411] ? lock_downgrade+0x810/0x810 [ 1488.804427] ? oom_killer_disable+0x280/0x280 [ 1488.804443] ? find_held_lock+0x35/0x130 [ 1488.804469] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1488.817082] ? memcg_event_wake+0x230/0x230 [ 1488.817103] ? do_raw_spin_unlock+0x57/0x270 [ 1488.817121] ? _raw_spin_unlock+0x2d/0x50 [ 1488.817137] try_charge+0xef7/0x1480 [ 1488.842627] ? find_held_lock+0x35/0x130 [ 1488.846724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1488.851599] ? kasan_check_read+0x11/0x20 [ 1488.855777] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1488.860652] mem_cgroup_try_charge+0x259/0x6b0 [ 1488.865265] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1488.870222] wp_page_copy+0x430/0x16a0 [ 1488.874136] ? pmd_pfn+0x1d0/0x1d0 03:48:32 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1488.877695] ? kasan_check_read+0x11/0x20 [ 1488.881860] ? do_raw_spin_unlock+0x57/0x270 [ 1488.886287] do_wp_page+0x57d/0x10b0 [ 1488.890019] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1488.894707] ? kasan_check_write+0x14/0x20 [ 1488.898971] ? do_raw_spin_lock+0xc8/0x240 [ 1488.903223] __handle_mm_fault+0x2305/0x3f80 [ 1488.907640] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1488.912519] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1488.917489] handle_mm_fault+0x1b5/0x690 [ 1488.921661] __do_page_fault+0x62a/0xe90 [ 1488.921683] ? vmalloc_fault+0x740/0x740 03:48:32 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1488.921698] ? trace_hardirqs_off_caller+0x65/0x220 [ 1488.921714] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1488.929858] ? page_fault+0x8/0x30 [ 1488.929880] do_page_fault+0x71/0x57d [ 1488.929895] ? page_fault+0x8/0x30 [ 1488.950716] page_fault+0x1e/0x30 [ 1488.954189] RIP: 0033:0x430b06 [ 1488.958965] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 03:48:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r1, 0x40000) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, r1, 0x0, 0xffe4) [ 1488.977879] RSP: 002b:00007ffc86dca060 EFLAGS: 00010206 [ 1488.983263] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1488.990552] RDX: 0000555556210930 RSI: 0000555556218970 RDI: 0000000000000003 [ 1488.997841] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555620f940 [ 1489.005129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1489.012601] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1489.032001] Task in /syz2 killed as a result of limit of /syz2 [ 1489.039852] memory: usage 912kB, limit 0kB, failcnt 271879 [ 1489.051809] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1489.069859] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:48:32 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000043050000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:48:32 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1489.094319] Memory cgroup stats for /syz2: cache:156KB rss:32KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1489.116882] Memory cgroup out of memory: Kill process 30332 (syz-executor.2) score 8758000 or sacrifice child [ 1489.137636] Killed process 30332 (syz-executor.2) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 1489.161143] oom_reaper: reaped process 30332 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:48:33 executing program 5: socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x2000089a2, &(0x7f0000000000)={'bridge0\x00\x00\f4\xbd\x19\n\x00', @ifru_addrs=@nl=@proc}) 03:48:33 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1489.335091] bridge0: port 3(team0) entered blocking state [ 1489.342007] bridge0: port 3(team0) entered disabled state [ 1489.350874] device team0 entered promiscuous mode [ 1489.356543] device team_slave_0 entered promiscuous mode [ 1489.362999] device team_slave_1 entered promiscuous mode [ 1489.370585] bridge0: port 3(team0) entered blocking state [ 1489.376426] bridge0: port 3(team0) entered forwarding state 03:48:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe90}], 0x1}}], 0x2, 0x0, 0x0) 03:48:33 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:33 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:33 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000040)={0x20003, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:48:33 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1489.765333] device bridge_slave_1 left promiscuous mode [ 1489.772678] bridge0: port 2(bridge_slave_1) entered disabled state 03:48:33 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x20003}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x8090ae81, &(0x7f00000000c0)) [ 1489.845362] device bridge_slave_0 left promiscuous mode [ 1489.850996] bridge0: port 1(bridge_slave_0) entered disabled state 03:48:33 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:33 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=@newqdisc={0x444, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x418, 0x2, [@TCA_CBQ_RTAB={0x404}, @TCA_CBQ_RATE={0x10, 0x5, {0x5, 0x0, 0x0, 0x0, 0x0, 0x7f}}]}}]}, 0x444}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000440)={'bridge_slave_1\x00', 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") getsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000480)={@empty, @multicast2, 0x0}, &(0x7f00000004c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001900)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=@newqdisc={0x444, 0x24, 0x507, 0x0, 0x0, {0x0, r13, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x418, 0x2, [@TCA_CBQ_RTAB={0x404}, @TCA_CBQ_RATE={0x10, 0x5, {0x5, 0x0, 0x0, 0x0, 0x0, 0x7f}}]}}]}, 0x444}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00', r13}) r15 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r15, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") getsockopt$inet_IP_XFRM_POLICY(r15, 0x0, 0x11, &(0x7f0000001dc0)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001ec0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000036c0)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f00000037c0)=0xe8) sendmmsg$inet(r0, &(0x7f0000004e40)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="1d12e8fb6312a6e85c5f9ec244722cf0fb28f2ce32cfa3be77457093367bd72a0238fcd63ab6ea4f0ab77e1d90f81c49cdf8319da8f52074d632427912b71a740ff9df930705c5016177094ad882c70b04975811f6c3393b8a517f2966b96a7b82a4c5eb4dddc822570deb0211283afbfe0468f76c644aff13c687811fe15e4fe25d21820001c1827e61c4224df030f09e0570b513839555231375c509793f3d9693134c9eadc45113c53af7871d043894ea87bce441ba64b31680c73f78c99ce4c27628effb8b2c", 0xc8}, {&(0x7f0000000200)="5219c4a5097bcfd00970b95575033215c1bbd40ed8b9ba4267e510fee09db79a62cddbf5910d6305162e33940a68408c7fd57afdc44485a2a0ac7b651a9c88b6e72c4a4b942c37da25a8382c8082381dc1475ea140e04f74faebb8d263644f71243551ba72af331bb0701650d0be9757a3c91eab7cf212", 0x77}, {&(0x7f0000000280)="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", 0xfd}, {&(0x7f0000000380)="7f744474e6b3d261d80ebba2e46b11efe4625b468d7aa1d399756f7eaae7c70868a3bf18a4e516d1a11a17b7661e41b356f81241148b8699c92c351efb5949d45ea7121ae769c854c256d58323f038d4da88eb14b4b15ba6ed0b6b10463cfc6e7650e832d811b3c343cae7f2f9f3b870bbf80c0957b40368", 0x78}], 0x4, &(0x7f0000000500)=[@ip_retopts={{0xb0, 0x0, 0x7, {[@lsrr={0x83, 0x2b, 0x5, [@multicast1, @rand_addr=0x3, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @multicast2, @multicast1, @remote, @remote]}, @generic={0x76f03d41b75abf22, 0xe, "64adee0c0a3178ed323d9d67"}, @cipso={0x86, 0x14, 0xfc4, [{0x7, 0xe, "637a2d6af60b4f1ee7ac6d97"}]}, @end, @ra={0x94, 0x6, 0x8b}, @timestamp={0x44, 0x20, 0x9, 0x1, 0x6, [{[@empty], 0x5}, {[@broadcast], 0x401}, {[], 0x20}, {[@remote]}]}, @ra={0x94, 0x6, 0x5}, @rr={0x7, 0x23, 0x6, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @rand_addr=0xfff, @multicast2, @dev={0xac, 0x14, 0x14, 0x2b}, @broadcast, @loopback]}]}}}, @ip_retopts={{0x70, 0x0, 0x7, {[@generic={0x88, 0x12, "a758cf90ff35e826f835662d7572e1fa"}, @rr={0x7, 0x1b, 0x7f, [@empty, @rand_addr=0x66e8, @multicast2, @empty, @rand_addr=0x4fd0b761, @rand_addr=0x3f]}, @lsrr={0x83, 0x7, 0x6, [@multicast2]}, @timestamp={0x44, 0x1c, 0x6, 0x0, 0x2, [{[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x101}, {[], 0x80}, {[], 0x6}, {[@remote], 0x6}]}, @ssrr={0x89, 0xf, 0x5a, [@local, @multicast1, @empty]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @dev={0xac, 0x14, 0x14, 0x2a}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @multicast1, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xfc}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @loopback, @dev={0xac, 0x14, 0x14, 0xa}}}}], 0x1b0}}, {{&(0x7f00000006c0)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000001880)=[{&(0x7f0000000740)="0aa329a6288d282e74c9362e7580af913847d4c3e4d19acd1077db1fa0738c00fea2ed43f134f99ce9782b98f7d9369415df01ee422f7be67c40d27b2e6af71edb030531163368a68484f07d09d239bf3f2032ec2d4fc3759226e5f00308642fd6ec732974ffba5e3f3126d538833205f58eca327bae1c66425048116d5c0be132c4486318a0ee9932be4063874a4a912e9e01daf8cf2f14e867c8ca2fbfc1550b9f927cfd646a2ec038ccf0c709f402c552715bf70235e372732e9025b940e89fc4b69e33ffa844575b39cd", 0xcc}, {&(0x7f0000001840)="5f4a17c955a94aacc8d96327", 0xc}], 0x2, &(0x7f0000001940)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @local, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x68}}, {{&(0x7f00000019c0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001a00)="7fab12a23b2e997a827b44c5b811289cce605ee3aedf7f6ce35e4ff9fe492b7b3179f0bd4c937d8643333bb804eeb80be83bd6c38c4d050459962b291ef5bef8652ccbfe97d823ae616386e1112d6ce0f832f0df12d1b82e84b68b7538c677478df043d36247a0fe1c6b0841d6f06b5b93a8e73102717bd161da389c9085281255e0639df735d89bc6cf5715666a5b215da97816b647273140fc955fcd3d08c8b9", 0xa1}, {&(0x7f0000001ac0)="6566340646f12748d7b79cd5b1d50a867330de09c4e76d013dedbd7f10c4657329d851f2c14c8a204b71f62bd64b15c4c0089599b7b68ab20ef386ab8c7a1820ef08aac8b1f34849ad9e92bc4536026e0ec21192e07ed6e617e7862cea722187ec5719a5e298bf0b8f53ea7ae3a8556eed79f405e7dd5e71fd471407ada827a9ca1c10e20f9f2bcedcd608e69d99b3ee7e9a89e4875a841cf325c55a95bbb64e4fc07d80d1643a54d04683e627daf5022d0c59d23f99ab5aa5f5ff07ae08aaccfeb345442f825879b92afb71e376696f6b5a20d792324b0a2f1920e64110e8b9ac31db72f03cdd3dcea7b891b8d965531b0008115a05f0", 0xf7}, {&(0x7f0000001bc0)="b91f96f0d05d06ba4f8b6017e90888413cc326f89a97cd9eea660c3c7ff17b5266b83bf4255298e18de9eaf6acb664558dac184283a5d7b1239b84efea8cfb4441253fbeb3dd8fefc757efc3551d2f0b58f1da4db2e411b6119fca7646b9a4a4a0c79fb8a931ff337c527a7f428c854be62f7142ce5b549d0d25042daf8961399d9742bc0b7d0c4fe2e4b379423c6fba949c426f", 0x94}], 0x3, &(0x7f0000001f00)=[@ip_ttl={{0x14, 0x0, 0x2, 0xfffffff7}}, @ip_retopts={{0x68, 0x0, 0x7, {[@noop, @timestamp={0x44, 0x3c, 0x20, 0xc736ff984e0bb207, 0x2, [{[], 0x4}, {[@multicast1], 0xffff6daa}, {[], 0x2}, {[@multicast2], 0x4}, {[@rand_addr=0x2], 0x400}, {[@broadcast], 0x1000}, {[], 0x9}, {[], 0x1}, {[@broadcast], 0x20}]}, @ssrr={0x89, 0x1b, 0x7, [@broadcast, @rand_addr=0x3, @dev={0xac, 0x14, 0x14, 0x1e}, @multicast1, @empty, @multicast2]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r14, @dev={0xac, 0x14, 0x14, 0x1d}, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r16, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x22}, @multicast2}}}], 0xf8}}, {{&(0x7f0000002000)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000003180)=[{&(0x7f0000002040)="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", 0x1000}, {&(0x7f0000003040)="8a5fa887a2c65b92c319827ef8e3d5a8da2170032571325cb587e4", 0x1b}, {&(0x7f0000003080)="b2e2896e5c573d76319ea13d67d47afd3a128c20bb429bed544df641918a08dfbae5692961910fd55e4c669f25dbcf64d57dca0581f7173e8b2f05a8b3efc2cce7b02aa4aac425382f35b0c8c41be9c86486711e4e2db456a2a87aff26f8eb299fcabfd12fda7c26f314ffa668b6811b0722508640fb041715340d7ab35f7d53be70b85b9f4fdd5d470410fc71ad2c902c918a52f97a5730208b72b5b0a3153699c038fb235358213cd16329bdbf3e8b23efd229c89424d83b789e53b50e017a33e8354423eaf61eabe0e2178b76fb61e8a3e81d9ede6c1a3868087e2b09b1165af7e06823fbae0ee30c01428e85a990843f", 0xf2}], 0x3}}, {{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f00000031c0)="f4de47532699b6b6b40a5e695ec7a65602cd8d5acdf4cb7caf8f6e0ac33b7bd36d985164ac46a118d2ab90ac36cd06ad4263b060b03a9996be93cfe0568beaa8506abd306081c6040ec6a1c4ed614f63130ebea88fe56f481dfc7afbf4e376276cafb53128", 0x65}, {&(0x7f0000003240)="f84fe42ac41a73c9142a2f6e1e31311a8edb0234046c9f1c6b429610de3bab55baa8876a975b9ad22f575d46fc82c1801078637f19b7fe8ecfed5ef298d868e936bfa7b1b69f99d58f248409091fe71ed9f43678177b8b4d1404bb6ea8ce3e0b45aa9b16f5a8c3df55c66433f86423ab363bf24b4396dd7cb08b3617577059351ae1895243e96c035a46afb59922ce6f75c925b6257209e60b1ccc0f45960df063465218e0e061df17866e86572bf83a3ebafebca854ef100aa11b1e96f04e08930f302c4ddf2abb9d49aa9aceaca293e0ebb31f371a7046bb96018874e7bab4201e3b56821de77d6b6aed3c2943576fde2f", 0xf2}, {&(0x7f0000003340)="5f94ab199af3fb32819852d28b58d1386a1414c8a91789ab2568267e190b26c6b16ec0c055bcba77fdeb1783b73c9344d9caec820a6772df43112920bf297e81d5e6c9d7d80a4d08c96972abb42227a551e7333e98b17adb603cee5a540dd5660c4141508e4a7cf533bfb2ddab2311f43e6e9f4dbb6c71f0c3d5615bcceb971a0cbdf7edcf79c4b04c23936391db4229a1dde18cacfde344e89cebbf6cda04aa7309f87510f653cbcfbc8ea771ec790f46aedb4935d98c4dd1bafdc38c0fe63db91bd97d6b3b7c88d25ee17082dde8b2c700cff3212c921af7d8f2f0b1ad0e98671793c41b74b34ce4", 0xe9}, {&(0x7f0000003440)="490eafce45fe7d47fe248631056cfa165df931424882db5bb2be13d5e0f90b793c98946c90b69678a6f5c1effefd47e140961c0db43e82ad1a0ec4d04d3e3ad20ec541f4cd5eb12471b66cf41094aaaa5397931f2e821a573f3bc8f3a6471fefc28317e0d139fad896809a337812876e25b017", 0x73}, {&(0x7f00000034c0)="53e3f3c9daa8f053353e3e7fd1efd9d6556c80fd69ad264d4d8de0df277d945ad9e1e3cb4bad9b189009e33682f2b4deed4f4b15764672cd330bc610f4f92730adcfeb9f95bbacd1d3aa671e91a44349981cfa1a0073b2ed9682deea04f49a94c3df05a4815a8cdc00a75ea3048f009970a0e29e34e1ab7d95", 0x79}], 0x5, &(0x7f0000003800)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r17, @multicast2, @rand_addr=0x2}}}], 0x20}}, {{&(0x7f0000003840)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000004d40)=[{&(0x7f0000003880)="0cd35c455297c7db31d95718f2ab93cf311abdc401be5eedf03e65166692f97c0595bd12280bff74b8eccfe814e9de96", 0x30}, {&(0x7f00000038c0)="4c9dcd6693436efc9634af025304104191e88bf43e2c044c851184b87fa783e7e690b81027d04b47ad516753cc69591a9f0be4358dc45d610a3871608da53a2987f1d99ec097e06b850df709bbe52381b935cf46e5e7a8c7a96e4979816b12d00092b7d107e4a0f4a481649ff427b31a", 0x70}, {&(0x7f0000003940)="ef3fabaee9f67a67e3198473a25ef9b3b9a2e11609b6ec5f9522fdabd2c812566d407050e9f2d2be7afe3149a0c28016ecc83ad8973fa674cb04e0cf1780ef385b79fb0bafad3a9a658443d50490ff7ddcdecddc8cacc4433bf0cc1a94f3c74b3ef06eaf276b80f4470d0ef87ab42364bac1086167f95c4961c6423f6f56fdc2ea46654be2d9902adacd5929a7913d312c3050c8d5", 0x95}, {&(0x7f0000003a00)}, {&(0x7f0000003a40)="5b04773eef6f3b2d41efaab243a81d5415fc1c5eab20680d528f0dfe9649e42c40ef08acbb0008a191d1060d07d2fa8f5d7c4160761bfdda18e8f7149ced945f2475b6af5e199561b074db62134d3470fec8eb", 0x53}, {&(0x7f0000003ac0)="3df10cec7d5501d1836cbb1505c88b51a0a1e66e7b0a323fb8ef4f7187195ab1e3a131ec00ecf75a218f3e02d142625a4c0c4823b17719728fc4a9048e8b", 0x3e}, {&(0x7f0000003b00)="61726df2bc3c7ed397383eda5689131f0d103dde40538eaca40626f4b3733c939cc564a6448f3b7933263adcd332f3bac149c52d41b136ebd3f1e47e19333d708c19a4ddaf44f2c83ae801c6904e9f242cfd4a198e3913151c922630473e298251663cdf7ba9383fdbf5f781f98af13aa1c7e0902b56fa73809f04bb0b3a18cff270202f3c0e73b5f1b05b4eb325875142646b82b892657bfe", 0x99}, {&(0x7f0000003bc0)="c70ba8f04607a737980783d8904d6fa54d5febd3eaa900fce0f232ab2fd071128415f25d035e47a88b65675144b290b1763a886b423e91fe010e80780753a1a5bed9b222ece994c0e25dfea8120aef7d6b4ee77541023c25724c84ff5bb8c5f3aae122f22d78cd30a981d558b245633a5dd2f3da42291bdc3c36bdeae66838d1922790f8c001b4be43e048b65fbebb828aa3b3e74286bbdf0e27a8c0ecd684348f8dd4d5d0cb00b28dd6d33496a6b9f6d48773adc0750c769b29432311dbaa81dc7d16dafcc33df18e593ef4e533121569a3b8248d00137779e12e7b15e085f6ffd668be172e74a4d36646c78d1492cb", 0xf0}, {&(0x7f0000003cc0)="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", 0x1000}, {&(0x7f0000004cc0)="267d5f50a424c280455e6fb890e7a5c1ef48a498537e0e41f1f31338c4fc0cc813a5e2866318820452c5879941bd3e469d1200b48c2b76bc746a111bc604da3cd9ddf8", 0x43}], 0xa, &(0x7f0000004e00)}}], 0x6, 0x10000000) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r18 = accept$alg(r0, 0x0, 0x0) write(r18, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r18, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:48:33 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1490.198084] device hsr_slave_1 left promiscuous mode [ 1490.273127] device hsr_slave_0 left promiscuous mode [ 1490.339022] team0 (unregistering): Port device team_slave_1 removed [ 1490.386902] team0 (unregistering): Port device team_slave_0 removed [ 1490.434067] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1490.502055] bond0 (unregistering): Releasing backup interface bond_slave_0 03:48:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xe98}], 0x1}}], 0x2, 0x0, 0x0) 03:48:34 executing program 5: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000002c0)='./file0\x00') clone(0x2100009ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0xfffffc0000000003, 0x0) close(r0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1490.745793] bond0 (unregistering): Released all slaves [ 1492.252220] IPVS: ftp: loaded support on port[0] = 21 [ 1492.322081] chnl_net:caif_netlink_parms(): no params data found [ 1492.359447] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.366205] bridge0: port 1(bridge_slave_0) entered disabled state [ 1492.373676] device bridge_slave_0 entered promiscuous mode [ 1492.381175] bridge0: port 2(bridge_slave_1) entered blocking state [ 1492.387926] bridge0: port 2(bridge_slave_1) entered disabled state [ 1492.395650] device bridge_slave_1 entered promiscuous mode [ 1492.415875] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1492.425755] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1492.443562] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1492.451450] team0: Port device team_slave_0 added [ 1492.457412] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1492.465266] team0: Port device team_slave_1 added [ 1492.470879] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1492.478768] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1492.547355] device hsr_slave_0 entered promiscuous mode [ 1492.594751] device hsr_slave_1 entered promiscuous mode [ 1492.634985] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1492.642288] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1492.658223] bridge0: port 2(bridge_slave_1) entered blocking state [ 1492.664820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1492.671428] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.677858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1492.716114] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1492.722233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1492.731752] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1492.742069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1492.750321] bridge0: port 1(bridge_slave_0) entered disabled state [ 1492.757766] bridge0: port 2(bridge_slave_1) entered disabled state [ 1492.765525] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1492.777941] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1492.784043] 8021q: adding VLAN 0 to HW filter on device team0 [ 1492.795883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1492.803711] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.810593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1492.820797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1492.829509] bridge0: port 2(bridge_slave_1) entered blocking state [ 1492.835945] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1492.853725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1492.863134] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1492.873460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1492.891997] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1492.902189] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1492.913971] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1492.926093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1492.933859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1492.942425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1492.955666] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1492.970884] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1493.027864] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1493.040087] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1493.045680] CPU: 0 PID: 30444 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1493.052623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1493.062133] Call Trace: [ 1493.064729] dump_stack+0x172/0x1f0 [ 1493.068361] dump_header+0x15e/0xa55 [ 1493.072079] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1493.077209] ? ___ratelimit+0x60/0x595 [ 1493.081397] ? do_raw_spin_unlock+0x57/0x270 [ 1493.085807] oom_kill_process.cold+0x10/0x6ef [ 1493.090301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.095866] ? task_will_free_mem+0x139/0x6e0 [ 1493.100371] out_of_memory+0x936/0x12d0 [ 1493.104353] ? oom_killer_disable+0x280/0x280 [ 1493.108859] ? cgroup_file_notify+0x140/0x1b0 [ 1493.115133] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1493.119980] ? memcg_event_wake+0x230/0x230 [ 1493.124311] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1493.129425] ? cgroup_file_notify+0x140/0x1b0 [ 1493.133918] memory_max_write+0x169/0x300 [ 1493.138091] ? mem_cgroup_write+0x360/0x360 [ 1493.142416] ? lock_acquire+0x16f/0x3f0 [ 1493.146384] ? kernfs_fop_write+0x227/0x480 [ 1493.150704] cgroup_file_write+0x241/0x790 [ 1493.154957] ? mem_cgroup_write+0x360/0x360 [ 1493.159400] ? kill_css+0x380/0x380 [ 1493.163025] ? kill_css+0x380/0x380 [ 1493.166651] kernfs_fop_write+0x2b8/0x480 [ 1493.170825] __vfs_write+0x114/0x810 [ 1493.174563] ? kernfs_fop_open+0xd80/0xd80 [ 1493.178809] ? kernel_read+0x120/0x120 [ 1493.182738] ? __lock_is_held+0xb6/0x140 [ 1493.186822] ? rcu_read_lock_sched_held+0x110/0x130 [ 1493.191861] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1493.196647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.202342] ? __sb_start_write+0x1a9/0x360 [ 1493.206668] vfs_write+0x20c/0x560 [ 1493.210335] ksys_write+0x14f/0x2d0 [ 1493.214119] ? __ia32_sys_read+0xb0/0xb0 [ 1493.218221] ? do_syscall_64+0x26/0x620 [ 1493.222202] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.227566] ? do_syscall_64+0x26/0x620 [ 1493.231541] __x64_sys_write+0x73/0xb0 [ 1493.235434] do_syscall_64+0xfd/0x620 [ 1493.239238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.244423] RIP: 0033:0x459a29 [ 1493.247631] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1493.266802] RSP: 002b:00007fd917a50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1493.274515] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1493.281791] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1493.289087] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1493.296367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd917a516d4 [ 1493.303639] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1493.313159] Task in /syz2 killed as a result of limit of /syz2 [ 1493.320320] memory: usage 3280kB, limit 0kB, failcnt 271880 [ 1493.326659] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1493.333564] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1493.340641] Memory cgroup stats for /syz2: cache:156KB rss:2104KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1493.361670] Memory cgroup out of memory: Kill process 30443 (syz-executor.2) score 9273000 or sacrifice child 03:48:37 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:37 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:37 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") syz_read_part_table(0x0, 0xaaaaaaaaaaaacc2, &(0x7f0000000080)=[{&(0x7f0000000000)="0201630000000a000000ff07000000ffffffee000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) 03:48:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(cbc(aes),cryptd(sha224))\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0xf0984be65312c77b}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000000c0)=[{0x2, 0x0, [0x4, 0xffffffff, 0x3, 0x7, 0x1ff, 0xb4, 0xf0000000, 0x8, 0xfff, 0x4, 0xfffffffd, 0x96e4, 0x6, 0x40, 0x39c7, 0x6]}], r3, 0x1, 0x1, 0x48}}, 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r4 = accept$alg(r0, 0x0, 0x0) write(r4, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r4, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:48:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xea0}], 0x1}}], 0x2, 0x0, 0x0) [ 1493.372031] Killed process 30443 (syz-executor.2) total-vm:72584kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 1493.388572] oom_reaper: reaped process 30443 (syz-executor.2), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 1493.416852] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1493.484703] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1493.490173] CPU: 1 PID: 30440 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1493.497112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1493.506590] Call Trace: [ 1493.509222] dump_stack+0x172/0x1f0 [ 1493.512882] dump_header+0x15e/0xa55 [ 1493.516624] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1493.521859] ? ___ratelimit+0x60/0x595 [ 1493.525770] ? do_raw_spin_unlock+0x57/0x270 [ 1493.530236] oom_kill_process.cold+0x10/0x6ef [ 1493.534763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.540420] ? task_will_free_mem+0x139/0x6e0 [ 1493.544959] out_of_memory+0x936/0x12d0 [ 1493.548974] ? lock_downgrade+0x810/0x810 [ 1493.553161] ? oom_killer_disable+0x280/0x280 [ 1493.557683] ? find_held_lock+0x35/0x130 [ 1493.561782] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1493.566655] ? memcg_event_wake+0x230/0x230 [ 1493.571014] ? do_raw_spin_unlock+0x57/0x270 [ 1493.575453] ? _raw_spin_unlock+0x2d/0x50 [ 1493.579634] try_charge+0xef7/0x1480 03:48:37 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1493.583375] ? find_held_lock+0x35/0x130 [ 1493.587471] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1493.592351] ? kasan_check_read+0x11/0x20 [ 1493.596535] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1493.601405] mem_cgroup_try_charge+0x259/0x6b0 [ 1493.606058] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1493.611018] wp_page_copy+0x430/0x16a0 [ 1493.614942] ? pmd_pfn+0x1d0/0x1d0 [ 1493.618513] ? kasan_check_read+0x11/0x20 [ 1493.622682] ? do_raw_spin_unlock+0x57/0x270 [ 1493.627107] do_wp_page+0x57d/0x10b0 03:48:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getgroups(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setreuid(0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x11d) utime(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280)={0xfffffffffffffffc}) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) [ 1493.630856] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1493.635788] ? kasan_check_write+0x14/0x20 [ 1493.640043] ? do_raw_spin_lock+0xc8/0x240 [ 1493.644300] __handle_mm_fault+0x2305/0x3f80 [ 1493.648736] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1493.653642] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1493.658435] handle_mm_fault+0x1b5/0x690 [ 1493.662707] __do_page_fault+0x62a/0xe90 [ 1493.666797] ? vmalloc_fault+0x740/0x740 [ 1493.670879] ? trace_hardirqs_off_caller+0x65/0x220 [ 1493.675912] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1493.681302] ? page_fault+0x8/0x30 [ 1493.684872] do_page_fault+0x71/0x57d [ 1493.688699] ? page_fault+0x8/0x30 [ 1493.692267] page_fault+0x1e/0x30 [ 1493.695732] RIP: 0033:0x430b06 [ 1493.699026] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1493.718122] RSP: 002b:00007ffdcbbad580 EFLAGS: 00010206 [ 1493.723503] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 03:48:37 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:37 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1493.730877] RDX: 000055555636b930 RSI: 0000555556373970 RDI: 0000000000000003 [ 1493.738167] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555636a940 [ 1493.745458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1493.752833] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1493.901991] Task in /syz2 killed as a result of limit of /syz2 03:48:37 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1493.956757] memory: usage 948kB, limit 0kB, failcnt 271888 [ 1493.995821] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 03:48:37 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1494.002636] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1494.017820] Memory cgroup stats for /syz2: cache:156KB rss:96KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1494.064457] Memory cgroup out of memory: Kill process 30440 (syz-executor.2) score 8758000 or sacrifice child [ 1494.113247] Killed process 30440 (syz-executor.2) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 1494.134078] oom_reaper: reaped process 30440 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:48:38 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f0000000280)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x5}}, {@rq={'rq', 0x3d, 0xb38a}}, {@common=@access_client='access=client'}, {@rq={'rq', 0x3d, 0x100000000}}, {@sq={'sq', 0x3d, 0x568e}}, {@timeout={'timeout', 0x3d, 0x1383cb2f}}], [{@smackfshat={'smackfshat', 0x3d, 'keyring-)'}}, {@obj_user={'obj_user', 0x3d, 'y\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x33, 0x66, 0x62, 0x61, 0x33, 0x31, 0x1fadb3e19dedc3c3], 0x2d, [0x64, 0x30, 0xb0d367841ec74ed3, 0x31], 0x2d, [0x62, 0x32, 0xf8e8dacc0aebedad, 0x33], 0x2d, [0x36, 0xe90da7a9615ff45c, 0x38, 0x5e], 0x2d, [0x0, 0x2, 0x37, 0x30, 0x37, 0x52, 0x0, 0x65]}}}]}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r4, 0x0, 0x2}, 0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000000c0)={r4, 0x8}, &(0x7f0000000100)=0x8) 03:48:38 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xea8}], 0x1}}], 0x2, 0x0, 0x0) 03:48:38 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:38 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:38 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:38 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1494.835383] device bridge_slave_1 left promiscuous mode [ 1494.840953] bridge0: port 2(bridge_slave_1) entered disabled state 03:48:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1494.930796] device bridge_slave_0 left promiscuous mode [ 1494.956885] bridge0: port 1(bridge_slave_0) entered disabled state [ 1495.209019] device hsr_slave_1 left promiscuous mode [ 1495.248800] device hsr_slave_0 left promiscuous mode [ 1495.290248] team0 (unregistering): Port device team_slave_1 removed [ 1495.326610] team0 (unregistering): Port device team_slave_0 removed [ 1495.362088] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1495.429682] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1495.595235] bond0 (unregistering): Released all slaves 03:48:39 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:39 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:39 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='.\x00', 0xfffffffffffffff9) keyctl$link(0x8, 0x0, r2) recvmmsg(r1, &(0x7f00000000c0)=[{{0x0, 0x365, &(0x7f0000000700)}}], 0x1, 0x0, 0x0) 03:48:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xeb0}], 0x1}}], 0x2, 0x0, 0x0) [ 1496.713011] IPVS: ftp: loaded support on port[0] = 21 [ 1496.820382] chnl_net:caif_netlink_parms(): no params data found [ 1496.880853] bridge0: port 1(bridge_slave_0) entered blocking state [ 1496.890774] bridge0: port 1(bridge_slave_0) entered disabled state [ 1496.909134] device bridge_slave_0 entered promiscuous mode [ 1496.918619] bridge0: port 2(bridge_slave_1) entered blocking state [ 1496.925237] bridge0: port 2(bridge_slave_1) entered disabled state [ 1496.932581] device bridge_slave_1 entered promiscuous mode [ 1496.953307] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1496.962887] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1496.983719] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1496.991272] team0: Port device team_slave_0 added [ 1496.998137] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1497.005805] team0: Port device team_slave_1 added [ 1497.011353] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1497.019182] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1497.086874] device hsr_slave_0 entered promiscuous mode [ 1497.124650] device hsr_slave_1 entered promiscuous mode [ 1497.165034] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1497.172317] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1497.188663] bridge0: port 2(bridge_slave_1) entered blocking state [ 1497.195089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1497.201732] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.208219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1497.246047] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1497.252174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1497.261856] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1497.271349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1497.279952] bridge0: port 1(bridge_slave_0) entered disabled state [ 1497.287777] bridge0: port 2(bridge_slave_1) entered disabled state [ 1497.295887] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1497.306478] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1497.312587] 8021q: adding VLAN 0 to HW filter on device team0 [ 1497.324176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1497.332376] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.338820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1497.357110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1497.365107] bridge0: port 2(bridge_slave_1) entered blocking state [ 1497.371491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1497.389164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1497.397531] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1497.406272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1497.414630] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1497.424570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1497.433930] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1497.440767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1497.458480] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1497.469885] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1497.573793] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1497.585507] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1497.591359] CPU: 0 PID: 30568 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1497.598339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.607694] Call Trace: [ 1497.610427] dump_stack+0x172/0x1f0 [ 1497.614088] dump_header+0x15e/0xa55 [ 1497.617854] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1497.623002] ? ___ratelimit+0x60/0x595 [ 1497.626901] ? do_raw_spin_unlock+0x57/0x270 [ 1497.631344] oom_kill_process.cold+0x10/0x6ef [ 1497.635855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1497.641408] ? task_will_free_mem+0x139/0x6e0 [ 1497.645924] out_of_memory+0x936/0x12d0 [ 1497.649921] ? oom_killer_disable+0x280/0x280 [ 1497.654432] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1497.659297] ? memcg_event_wake+0x230/0x230 [ 1497.663645] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1497.668846] ? cgroup_file_notify+0x140/0x1b0 [ 1497.673343] memory_max_write+0x169/0x300 [ 1497.677501] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1497.682282] ? mem_cgroup_write+0x360/0x360 [ 1497.686621] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1497.691383] cgroup_file_write+0x241/0x790 [ 1497.695630] ? mem_cgroup_write+0x360/0x360 [ 1497.699974] ? kill_css+0x380/0x380 [ 1497.703649] ? kernfs_fop_write+0x235/0x480 [ 1497.707969] ? kill_css+0x380/0x380 [ 1497.711595] kernfs_fop_write+0x2b8/0x480 [ 1497.715751] __vfs_write+0x114/0x810 [ 1497.719473] ? kernfs_fop_open+0xd80/0xd80 [ 1497.723699] ? kernel_read+0x120/0x120 [ 1497.727597] ? retint_kernel+0x2d/0x2d [ 1497.731486] ? __sb_start_write+0x264/0x360 [ 1497.735814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1497.741397] ? __sb_start_write+0x1a9/0x360 [ 1497.745732] vfs_write+0x20c/0x560 [ 1497.749293] ksys_write+0x14f/0x2d0 [ 1497.752913] ? __ia32_sys_read+0xb0/0xb0 [ 1497.758027] ? do_syscall_64+0x26/0x620 [ 1497.761997] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1497.767353] ? do_syscall_64+0x26/0x620 [ 1497.771326] __x64_sys_write+0x73/0xb0 [ 1497.775399] do_syscall_64+0xfd/0x620 [ 1497.779234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1497.784429] RIP: 0033:0x459a29 [ 1497.787625] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1497.806537] RSP: 002b:00007ff658022c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1497.814265] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1497.821722] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1497.829186] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1497.836480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6580236d4 [ 1497.843884] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1497.853535] Task in /syz2 killed as a result of limit of /syz2 [ 1497.862565] memory: usage 3280kB, limit 0kB, failcnt 271889 [ 1497.870567] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1497.877819] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1497.885443] Memory cgroup stats for /syz2: cache:156KB rss:2148KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1497.908100] Memory cgroup out of memory: Kill process 30567 (syz-executor.2) score 9273000 or sacrifice child [ 1497.918836] Killed process 30567 (syz-executor.2) total-vm:72584kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 1497.937648] oom_reaper: reaped process 30567 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 03:48:41 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:41 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:41 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xeb8}], 0x1}}], 0x2, 0x0, 0x0) 03:48:41 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x227a, 0x0) fcntl$getown(r2, 0x9) [ 1498.123191] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1498.147056] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1498.157049] CPU: 0 PID: 30564 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1498.164147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.173510] Call Trace: [ 1498.176111] dump_stack+0x172/0x1f0 [ 1498.179746] dump_header+0x15e/0xa55 [ 1498.183611] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1498.188720] ? ___ratelimit+0x60/0x595 [ 1498.192786] ? do_raw_spin_unlock+0x57/0x270 [ 1498.197205] oom_kill_process.cold+0x10/0x6ef [ 1498.201812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1498.207571] ? task_will_free_mem+0x139/0x6e0 [ 1498.212080] out_of_memory+0x936/0x12d0 [ 1498.216083] ? lock_downgrade+0x810/0x810 [ 1498.220248] ? oom_killer_disable+0x280/0x280 [ 1498.224749] ? find_held_lock+0x35/0x130 [ 1498.228850] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1498.233687] ? memcg_event_wake+0x230/0x230 [ 1498.238006] ? do_raw_spin_unlock+0x57/0x270 [ 1498.242421] ? _raw_spin_unlock+0x2d/0x50 [ 1498.246581] try_charge+0xef7/0x1480 [ 1498.250315] ? find_held_lock+0x35/0x130 [ 1498.254384] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1498.259240] ? kasan_check_read+0x11/0x20 [ 1498.263409] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1498.268267] mem_cgroup_try_charge+0x259/0x6b0 [ 1498.272849] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1498.277776] wp_page_copy+0x430/0x16a0 [ 1498.281673] ? pmd_pfn+0x1d0/0x1d0 [ 1498.285230] ? kasan_check_read+0x11/0x20 [ 1498.289391] ? do_raw_spin_unlock+0x57/0x270 [ 1498.293823] do_wp_page+0x57d/0x10b0 [ 1498.297635] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1498.302314] ? kasan_check_write+0x14/0x20 [ 1498.306553] ? do_raw_spin_lock+0xc8/0x240 [ 1498.310816] __handle_mm_fault+0x2305/0x3f80 [ 1498.315246] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1498.320122] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1498.324806] handle_mm_fault+0x1b5/0x690 [ 1498.328893] __do_page_fault+0x62a/0xe90 [ 1498.332963] ? vmalloc_fault+0x740/0x740 [ 1498.337046] ? trace_hardirqs_off_caller+0x65/0x220 [ 1498.342209] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1498.347152] ? page_fault+0x8/0x30 [ 1498.350703] do_page_fault+0x71/0x57d [ 1498.354507] ? page_fault+0x8/0x30 [ 1498.358049] page_fault+0x1e/0x30 [ 1498.361494] RIP: 0033:0x430b06 [ 1498.364685] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1498.383609] RSP: 002b:00007ffee84c4570 EFLAGS: 00010206 [ 1498.388973] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1498.396284] RDX: 00005555569e7930 RSI: 00005555569ef970 RDI: 0000000000000003 [ 1498.403556] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555569e6940 [ 1498.410819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1498.418095] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1498.428276] Task in /syz2 killed as a result of limit of /syz2 03:48:42 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1498.472734] memory: usage 948kB, limit 0kB, failcnt 271897 [ 1498.483108] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1498.509583] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:48:42 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:42 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:42 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1498.522127] Memory cgroup stats for /syz2: cache:156KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1498.554990] Memory cgroup out of memory: Kill process 30564 (syz-executor.2) score 8758000 or sacrifice child [ 1498.567470] Killed process 30564 (syz-executor.2) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 03:48:42 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000088470000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:48:42 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:42 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:42 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:42 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xec0}], 0x1}}], 0x2, 0x0, 0x0) 03:48:42 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:48:43 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:43 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:43 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1499.330346] device bridge_slave_1 left promiscuous mode [ 1499.362454] bridge0: port 2(bridge_slave_1) entered disabled state 03:48:43 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1499.460044] device bridge_slave_0 left promiscuous mode [ 1499.466208] bridge0: port 1(bridge_slave_0) entered disabled state 03:48:43 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:43 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:43 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:43 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1499.827039] device hsr_slave_1 left promiscuous mode [ 1499.878200] device hsr_slave_0 left promiscuous mode [ 1499.942820] team0 (unregistering): Port device team_slave_1 removed [ 1499.989622] team0 (unregistering): Port device team_slave_0 removed [ 1500.038761] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1500.099658] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1500.181583] bond0 (unregistering): Released all slaves [ 1501.249024] IPVS: ftp: loaded support on port[0] = 21 [ 1501.365688] chnl_net:caif_netlink_parms(): no params data found [ 1501.403812] bridge0: port 1(bridge_slave_0) entered blocking state [ 1501.410626] bridge0: port 1(bridge_slave_0) entered disabled state [ 1501.418144] device bridge_slave_0 entered promiscuous mode [ 1501.425498] bridge0: port 2(bridge_slave_1) entered blocking state [ 1501.432195] bridge0: port 2(bridge_slave_1) entered disabled state [ 1501.439887] device bridge_slave_1 entered promiscuous mode [ 1501.459045] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1501.468390] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1501.486653] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1501.494050] team0: Port device team_slave_0 added [ 1501.500832] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1501.508742] team0: Port device team_slave_1 added [ 1501.514171] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1501.521700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1501.577608] device hsr_slave_0 entered promiscuous mode [ 1501.634870] device hsr_slave_1 entered promiscuous mode [ 1501.675066] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1501.682251] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1501.697580] bridge0: port 2(bridge_slave_1) entered blocking state [ 1501.703984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1501.710727] bridge0: port 1(bridge_slave_0) entered blocking state [ 1501.717171] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1501.756681] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1501.762790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1501.772598] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1501.782278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1501.790203] bridge0: port 1(bridge_slave_0) entered disabled state [ 1501.799169] bridge0: port 2(bridge_slave_1) entered disabled state [ 1501.806486] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1501.820892] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1501.827600] 8021q: adding VLAN 0 to HW filter on device team0 [ 1501.840985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1501.849485] bridge0: port 1(bridge_slave_0) entered blocking state [ 1501.855903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1501.881560] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1501.893376] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1501.903797] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1501.911608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1501.919745] bridge0: port 2(bridge_slave_1) entered blocking state [ 1501.926333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1501.934115] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1501.942504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1501.950582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1501.958609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1501.971312] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1501.978548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1501.985915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1502.001425] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1502.115786] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1502.127650] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1502.133600] CPU: 1 PID: 30650 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1502.140553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1502.150086] Call Trace: [ 1502.152880] dump_stack+0x172/0x1f0 [ 1502.156606] dump_header+0x15e/0xa55 [ 1502.160324] oom_kill_process.cold+0x10/0x6ef [ 1502.164828] out_of_memory+0x936/0x12d0 [ 1502.168811] ? oom_killer_disable+0x280/0x280 [ 1502.173310] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1502.178147] ? memcg_event_wake+0x230/0x230 [ 1502.182464] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1502.187559] ? cgroup_file_notify+0x140/0x1b0 [ 1502.192049] memory_max_write+0x169/0x300 [ 1502.196199] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1502.200957] ? mem_cgroup_write+0x360/0x360 [ 1502.205310] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1502.210057] cgroup_file_write+0x241/0x790 [ 1502.214294] ? mem_cgroup_write+0x360/0x360 [ 1502.218605] ? kill_css+0x380/0x380 [ 1502.222321] ? kill_css+0x380/0x380 [ 1502.225942] kernfs_fop_write+0x2b8/0x480 [ 1502.230081] __vfs_write+0x114/0x810 [ 1502.233783] ? kernfs_fop_open+0xd80/0xd80 [ 1502.238093] ? kernel_read+0x120/0x120 [ 1502.241983] ? __lock_is_held+0xb6/0x140 [ 1502.246040] ? rcu_read_lock_sched_held+0x110/0x130 [ 1502.251051] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1502.255806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1502.261351] ? __sb_start_write+0x1a9/0x360 [ 1502.265673] vfs_write+0x20c/0x560 [ 1502.269229] ksys_write+0x14f/0x2d0 [ 1502.272849] ? __ia32_sys_read+0xb0/0xb0 [ 1502.276901] ? do_syscall_64+0x26/0x620 [ 1502.280863] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.286213] ? do_syscall_64+0x26/0x620 [ 1502.290178] __x64_sys_write+0x73/0xb0 [ 1502.294070] do_syscall_64+0xfd/0x620 [ 1502.297879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.303069] RIP: 0033:0x459a29 [ 1502.306261] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1502.325156] RSP: 002b:00007fc7c14d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1502.332866] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1502.340124] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1502.347393] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1502.354671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc7c14d46d4 [ 1502.361933] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1502.395641] Task in /syz2 killed as a result of limit of /syz2 [ 1502.402105] memory: usage 3244kB, limit 0kB, failcnt 271898 [ 1502.408633] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1502.422909] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:48:46 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1502.429613] Memory cgroup stats for /syz2: cache:156KB rss:2088KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1502.451845] Memory cgroup out of memory: Kill process 30649 (syz-executor.2) score 9272000 or sacrifice child [ 1502.463293] Killed process 30649 (syz-executor.2) total-vm:72584kB, anon-rss:2180kB, file-rss:35808kB, shmem-rss:0kB [ 1502.477956] oom_reaper: reaped process 30649 (syz-executor.2), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 03:48:46 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:46 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:46 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xec8}], 0x1}}], 0x2, 0x0, 0x0) 03:48:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x101200, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r4, 0x0, 0x2}, 0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=r4, @ANYBLOB="28000000bab32fe69f1ea016c71fb30c0e53a0c4e4b4751d901a55b95da229230000006f16fc1be76fcb410b08daff05e67d1ee2e22fc64b3c6269db71666d4b222b8b2ee1dd037582c0cbf044129da7d873c5fa31e5c986b1e058714533c77e38acf138797a411404a9c23066fa2fd4e310eabba8c6898b2d"], &(0x7f0000000140)=0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1502.506163] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1502.532257] syz-executor.2 cpuset=syz2 mems_allowed=0-1 03:48:46 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1502.551708] CPU: 0 PID: 30646 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1502.558686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1502.568054] Call Trace: [ 1502.570664] dump_stack+0x172/0x1f0 [ 1502.574404] dump_header+0x15e/0xa55 [ 1502.578145] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1502.583296] ? ___ratelimit+0x60/0x595 [ 1502.587203] ? do_raw_spin_unlock+0x57/0x270 [ 1502.591633] oom_kill_process.cold+0x10/0x6ef [ 1502.596143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1502.601697] ? task_will_free_mem+0x139/0x6e0 [ 1502.606225] out_of_memory+0x936/0x12d0 [ 1502.610223] ? lock_downgrade+0x810/0x810 [ 1502.614386] ? oom_killer_disable+0x280/0x280 [ 1502.618904] ? find_held_lock+0x35/0x130 [ 1502.623007] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1502.627875] ? memcg_event_wake+0x230/0x230 [ 1502.632209] ? do_raw_spin_unlock+0x57/0x270 [ 1502.636609] ? _raw_spin_unlock+0x2d/0x50 [ 1502.640748] try_charge+0xef7/0x1480 [ 1502.644470] ? find_held_lock+0x35/0x130 [ 1502.649057] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1502.654005] ? kasan_check_read+0x11/0x20 [ 1502.658156] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1502.663000] mem_cgroup_try_charge+0x259/0x6b0 [ 1502.667603] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1502.672553] __handle_mm_fault+0x1e50/0x3f80 [ 1502.676959] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1502.681822] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1502.686586] handle_mm_fault+0x1b5/0x690 [ 1502.690654] __do_page_fault+0x62a/0xe90 [ 1502.694704] ? ksys_write+0x1f1/0x2d0 [ 1502.698496] ? vmalloc_fault+0x740/0x740 [ 1502.702549] ? trace_hardirqs_off_caller+0x65/0x220 [ 1502.707555] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1502.712476] ? page_fault+0x8/0x30 [ 1502.716040] do_page_fault+0x71/0x57d [ 1502.719880] ? page_fault+0x8/0x30 [ 1502.723409] page_fault+0x1e/0x30 [ 1502.726850] RIP: 0033:0x4034f2 [ 1502.730029] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 1502.749030] RSP: 002b:00007ffdec069f10 EFLAGS: 00010246 03:48:46 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1502.754393] RAX: 0000000000000000 RBX: 000000000016eb72 RCX: 0000000000413630 [ 1502.761666] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffdec06b040 [ 1502.768927] RBP: 0000000000000002 R08: 0000000000000001 R09: 00005555565e6940 [ 1502.776289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdec06b040 [ 1502.783676] R13: 00007ffdec06b030 R14: 0000000000000000 R15: 00007ffdec06b040 [ 1502.799764] Task in /syz2 killed as a result of limit of /syz2 [ 1502.806896] memory: usage 916kB, limit 0kB, failcnt 271906 03:48:46 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1502.833651] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1502.844554] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1502.851361] Memory cgroup stats for /syz2: cache:156KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:44KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1502.875559] Memory cgroup out of memory: Kill process 30646 (syz-executor.2) score 8757000 or sacrifice child [ 1502.887255] Killed process 30646 (syz-executor.2) total-vm:72452kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB 03:48:46 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:46 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:46 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:46 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:46 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:46 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:46 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xed0}], 0x1}}], 0x2, 0x0, 0x0) 03:48:47 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:47 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:47 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x50000, 0x0) accept4$inet(r2, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000140)=0x10, 0x80000) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1503.423722] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1503.449213] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1503.504739] CPU: 1 PID: 30686 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1503.511724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1503.521096] Call Trace: [ 1503.523704] dump_stack+0x172/0x1f0 [ 1503.527384] dump_header+0x15e/0xa55 [ 1503.531128] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1503.536256] ? ___ratelimit+0x60/0x595 [ 1503.540164] ? do_raw_spin_unlock+0x57/0x270 [ 1503.544597] oom_kill_process.cold+0x10/0x6ef [ 1503.549819] ? out_of_memory+0xaed/0x12d0 [ 1503.553995] out_of_memory+0x936/0x12d0 [ 1503.558083] ? oom_killer_disable+0x280/0x280 [ 1503.562608] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1503.567475] ? memcg_event_wake+0x230/0x230 [ 1503.571825] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1503.576977] ? cgroup_file_notify+0x140/0x1b0 [ 1503.581500] memory_max_write+0x169/0x300 [ 1503.585678] ? mem_cgroup_write+0x360/0x360 [ 1503.590038] ? lock_acquire+0x16f/0x3f0 [ 1503.594138] ? kernfs_fop_write+0x227/0x480 [ 1503.598504] cgroup_file_write+0x241/0x790 [ 1503.602763] ? mem_cgroup_write+0x360/0x360 [ 1503.607106] ? kill_css+0x380/0x380 [ 1503.610768] ? kill_css+0x380/0x380 [ 1503.614414] kernfs_fop_write+0x2b8/0x480 [ 1503.618609] __vfs_write+0x114/0x810 [ 1503.622343] ? kernfs_fop_open+0xd80/0xd80 [ 1503.626598] ? kernel_read+0x120/0x120 [ 1503.630506] ? __lock_is_held+0xb6/0x140 [ 1503.634613] ? rcu_read_lock_sched_held+0x110/0x130 [ 1503.639650] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1503.644427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1503.649994] ? __sb_start_write+0x1a9/0x360 [ 1503.654347] vfs_write+0x20c/0x560 [ 1503.659131] ksys_write+0x14f/0x2d0 [ 1503.662784] ? __ia32_sys_read+0xb0/0xb0 [ 1503.666969] ? do_syscall_64+0x26/0x620 [ 1503.670963] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.676351] ? do_syscall_64+0x26/0x620 [ 1503.680356] __x64_sys_write+0x73/0xb0 [ 1503.684284] do_syscall_64+0xfd/0x620 [ 1503.688195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.693399] RIP: 0033:0x459a29 [ 1503.696606] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1503.715529] RSP: 002b:00007f76f0c6ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1503.723279] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1503.730563] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1503.737879] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1503.745251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f76f0c6f6d4 [ 1503.752623] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff 03:48:47 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:47 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:47 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1503.945596] device bridge_slave_1 left promiscuous mode [ 1503.953448] bridge0: port 2(bridge_slave_1) entered disabled state 03:48:47 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1504.015544] device bridge_slave_0 left promiscuous mode [ 1504.021137] bridge0: port 1(bridge_slave_0) entered disabled state 03:48:47 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1504.095151] Task in /syz5 killed as a result of limit of /syz5 [ 1504.116682] memory: usage 81968kB, limit 0kB, failcnt 0 [ 1504.142578] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 03:48:47 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1504.234409] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1504.266702] Memory cgroup stats for /syz5: cache:0KB rss:73644KB rss_huge:61440KB shmem:64KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:29328KB active_anon:38140KB inactive_file:0KB active_file:0KB unevictable:6144KB [ 1504.357320] device hsr_slave_1 left promiscuous mode [ 1504.381099] Memory cgroup out of memory: Kill process 26964 (syz-executor.5) score 13363000 or sacrifice child [ 1504.399524] device hsr_slave_0 left promiscuous mode [ 1504.460708] team0 (unregistering): Port device team_slave_1 removed [ 1504.483432] Killed process 26964 (syz-executor.5) total-vm:72968kB, anon-rss:18472kB, file-rss:34816kB, shmem-rss:0kB [ 1504.526123] team0 (unregistering): Port device team_slave_0 removed [ 1504.566106] bond0 (unregistering): Releasing backup interface bond_slave_1 03:48:48 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xed8}], 0x1}}], 0x2, 0x0, 0x0) 03:48:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x20003, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) write(r3, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r3, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1504.601116] oom_reaper: reaped process 26964 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1504.639945] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1504.708642] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1504.724158] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1504.730179] CPU: 1 PID: 7900 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1504.737034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.737041] Call Trace: [ 1504.737059] dump_stack+0x172/0x1f0 [ 1504.737078] dump_header+0x15e/0xa55 [ 1504.737096] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1504.737112] ? ___ratelimit+0x60/0x595 [ 1504.737127] ? do_raw_spin_unlock+0x57/0x270 [ 1504.737144] oom_kill_process.cold+0x10/0x6ef [ 1504.737164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1504.737178] ? task_will_free_mem+0x139/0x6e0 [ 1504.737202] out_of_memory+0x936/0x12d0 [ 1504.749138] ? lock_downgrade+0x810/0x810 [ 1504.749159] ? oom_killer_disable+0x280/0x280 [ 1504.749172] ? find_held_lock+0x35/0x130 [ 1504.749198] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1504.749213] ? memcg_event_wake+0x230/0x230 [ 1504.749235] ? do_raw_spin_unlock+0x57/0x270 [ 1504.756561] ? _raw_spin_unlock+0x2d/0x50 [ 1504.756579] try_charge+0xef7/0x1480 [ 1504.756601] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1504.756622] ? rcu_read_lock_sched_held+0x110/0x130 [ 1504.756635] ? __alloc_pages_nodemask+0x632/0x750 [ 1504.756652] ? do_raw_spin_unlock+0x57/0x270 [ 1504.765628] memcg_kmem_charge_memcg+0x7c/0x130 [ 1504.765641] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1504.765652] ? cache_grow_begin+0x597/0x8c0 [ 1504.765664] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1504.765680] ? trace_hardirqs_on+0x67/0x220 [ 1504.765694] cache_grow_begin+0x3fa/0x8c0 [ 1504.765713] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1504.774677] ? __cpuset_node_allowed+0x136/0x540 [ 1504.774694] fallback_alloc+0x1fd/0x2d0 [ 1504.784810] ____cache_alloc_node+0x1be/0x1e0 [ 1504.784828] kmem_cache_alloc_node_trace+0xec/0x720 [ 1504.784842] ? lock_downgrade+0x810/0x810 [ 1504.784859] __kmalloc_node+0x3d/0x80 [ 1504.784875] kvmalloc_node+0x68/0x100 [ 1504.785001] xt_alloc_table_info+0x41/0xa0 [ 1504.785077] do_ip6t_set_ctl+0x25a/0x498 [ 1504.793233] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1504.793256] ? mutex_unlock+0xd/0x10 [ 1504.793346] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1504.793363] nf_setsockopt+0x77/0xd0 [ 1504.801942] ipv6_setsockopt+0x13e/0x170 [ 1504.801987] tcp_setsockopt+0x8f/0xe0 [ 1504.802007] sock_common_setsockopt+0x94/0xd0 [ 1504.811174] __sys_setsockopt+0x17a/0x280 [ 1504.811188] ? kernel_accept+0x310/0x310 [ 1504.811208] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1504.811221] ? do_syscall_64+0x26/0x620 [ 1504.811234] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.811249] ? do_syscall_64+0x26/0x620 [ 1504.819811] __x64_sys_setsockopt+0xbe/0x150 [ 1504.819829] do_syscall_64+0xfd/0x620 [ 1504.819846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.819856] RIP: 0033:0x45c55a [ 1504.819870] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1504.819877] RSP: 002b:00007fff24dfe838 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1504.828424] RAX: ffffffffffffffda RBX: 00007fff24dfe860 RCX: 000000000045c55a [ 1504.828431] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1504.828438] RBP: 0000000000712cc0 R08: 00000000000002e8 R09: 0000000000004000 [ 1504.828445] R10: 0000000000711fa0 R11: 0000000000000202 R12: 0000000000000003 [ 1504.828452] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000711f40 [ 1504.830903] Task in [ 1504.843912] /syz5 [ 1504.853729] killed as a result of limit of [ 1504.892314] /syz5 [ 1504.912503] memory: usage 60100kB, limit 0kB, failcnt 12 [ 1504.920432] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1504.935249] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1504.940961] Memory cgroup stats for [ 1504.969221] /syz5 [ 1504.983407] : [ 1505.010985] cache:0KB [ 1505.033436] rss:52256KB [ 1505.047522] rss_huge:47104KB [ 1505.063965] shmem:64KB [ 1505.071530] mapped_file:0KB [ 1505.084612] dirty:0KB [ 1505.090362] writeback:0KB [ 1505.095413] swap:0KB [ 1505.103196] inactive_anon:12076KB [ 1505.109405] active_anon:33948KB [ 1505.114424] inactive_file:0KB active_file:0KB unevictable:6144KB [ 1505.128707] Memory cgroup out of memory: Kill process 26921 (syz-executor.5) score 13303000 or sacrifice child [ 1505.139406] Killed process 26921 (syz-executor.5) total-vm:72712kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB [ 1505.152600] oom_reaper: reaped process 26921 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1505.164749] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1505.176832] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1505.182414] CPU: 1 PID: 7900 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1505.182422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1505.182427] Call Trace: [ 1505.182448] dump_stack+0x172/0x1f0 [ 1505.182466] dump_header+0x15e/0xa55 [ 1505.182482] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1505.182503] ? ___ratelimit+0x60/0x595 [ 1505.182516] ? do_raw_spin_unlock+0x57/0x270 [ 1505.182532] oom_kill_process.cold+0x10/0x6ef [ 1505.182550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1505.198900] ? task_will_free_mem+0x139/0x6e0 [ 1505.205113] out_of_memory+0x936/0x12d0 [ 1505.205131] ? lock_downgrade+0x810/0x810 [ 1505.205148] ? oom_killer_disable+0x280/0x280 [ 1505.205162] ? find_held_lock+0x35/0x130 [ 1505.205185] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1505.214003] ? memcg_event_wake+0x230/0x230 [ 1505.214025] ? do_raw_spin_unlock+0x57/0x270 [ 1505.214039] ? _raw_spin_unlock+0x2d/0x50 [ 1505.214055] try_charge+0xef7/0x1480 [ 1505.214076] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1505.214095] ? rcu_read_lock_sched_held+0x110/0x130 [ 1505.214107] ? __alloc_pages_nodemask+0x632/0x750 [ 1505.214118] ? do_raw_spin_unlock+0x57/0x270 [ 1505.214139] memcg_kmem_charge_memcg+0x7c/0x130 [ 1505.214157] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1505.222533] ? cache_grow_begin+0x597/0x8c0 [ 1505.222550] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1505.222567] ? trace_hardirqs_on+0x67/0x220 [ 1505.222583] cache_grow_begin+0x3fa/0x8c0 [ 1505.222599] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1505.222615] ? __cpuset_node_allowed+0x136/0x540 [ 1505.232754] fallback_alloc+0x1fd/0x2d0 [ 1505.232775] ____cache_alloc_node+0x1be/0x1e0 [ 1505.232791] kmem_cache_alloc_node_trace+0xec/0x720 [ 1505.232804] ? lock_downgrade+0x810/0x810 [ 1505.232822] __kmalloc_node+0x3d/0x80 [ 1505.232838] kvmalloc_node+0x68/0x100 [ 1505.232856] xt_alloc_table_info+0x41/0xa0 [ 1505.241323] do_ip6t_set_ctl+0x25a/0x498 [ 1505.241341] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1505.241362] ? mutex_unlock+0xd/0x10 [ 1505.241376] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1505.241391] nf_setsockopt+0x77/0xd0 [ 1505.241409] ipv6_setsockopt+0x13e/0x170 [ 1505.241425] tcp_setsockopt+0x8f/0xe0 [ 1505.241443] sock_common_setsockopt+0x94/0xd0 [ 1505.241458] __sys_setsockopt+0x17a/0x280 [ 1505.250100] ? kernel_accept+0x310/0x310 [ 1505.250122] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1505.250133] ? do_syscall_64+0x26/0x620 [ 1505.250146] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.250157] ? do_syscall_64+0x26/0x620 [ 1505.250174] __x64_sys_setsockopt+0xbe/0x150 [ 1505.250188] do_syscall_64+0xfd/0x620 [ 1505.250203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.250215] RIP: 0033:0x45c55a [ 1505.259106] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1505.259113] RSP: 002b:00007fff24dfe838 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1505.259128] RAX: ffffffffffffffda RBX: 00007fff24dfe860 RCX: 000000000045c55a [ 1505.259135] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1505.259142] RBP: 0000000000712cc0 R08: 00000000000002e8 R09: 0000000000004000 [ 1505.259148] R10: 0000000000711fa0 R11: 0000000000000202 R12: 0000000000000003 [ 1505.259155] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000711f40 [ 1505.264146] Task in [ 1505.277324] /syz5 [ 1505.288082] killed as a result of limit of [ 1505.299309] /syz5 [ 1505.313852] memory: usage 41672kB, limit 0kB, failcnt 18 [ 1505.327553] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1505.333216] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1505.342016] Memory cgroup stats for [ 1505.351323] /syz5 [ 1505.359082] : [ 1505.368548] cache:0KB [ 1505.382741] rss:33932KB [ 1505.399924] rss_huge:30720KB [ 1505.407672] shmem:64KB [ 1505.416530] mapped_file:0KB [ 1505.430535] dirty:0KB [ 1505.439649] writeback:0KB [ 1505.462097] swap:0KB [ 1505.477709] inactive_anon:0KB [ 1505.499267] active_anon:33936KB [ 1505.516196] inactive_file:0KB [ 1505.523994] active_file:0KB [ 1505.537368] unevictable:0KB [ 1505.546554] Memory cgroup out of memory: Kill process 1117 (syz-executor.5) score 13165000 or sacrifice child [ 1505.556222] Killed process 1117 (syz-executor.5) total-vm:73372kB, anon-rss:16596kB, file-rss:35888kB, shmem-rss:0kB [ 1505.603279] oom_reaper: reaped process 1117 (syz-executor.5), now anon-rss:0kB, file-rss:34928kB, shmem-rss:0kB [ 1505.617049] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1505.638700] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1505.644850] CPU: 1 PID: 7900 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1505.651716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1505.661159] Call Trace: [ 1505.661181] dump_stack+0x172/0x1f0 [ 1505.661200] dump_header+0x15e/0xa55 [ 1505.661216] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1505.661231] ? ___ratelimit+0x60/0x595 [ 1505.661243] ? do_raw_spin_unlock+0x57/0x270 [ 1505.661259] oom_kill_process.cold+0x10/0x6ef [ 1505.661274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1505.661287] ? task_will_free_mem+0x139/0x6e0 [ 1505.661307] out_of_memory+0x936/0x12d0 [ 1505.661320] ? lock_downgrade+0x810/0x810 [ 1505.661336] ? oom_killer_disable+0x280/0x280 [ 1505.661348] ? find_held_lock+0x35/0x130 [ 1505.661371] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1505.661385] ? memcg_event_wake+0x230/0x230 [ 1505.661406] ? do_raw_spin_unlock+0x57/0x270 [ 1505.661420] ? _raw_spin_unlock+0x2d/0x50 [ 1505.667625] try_charge+0xef7/0x1480 [ 1505.667651] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1505.676447] ? rcu_read_lock_sched_held+0x110/0x130 [ 1505.676460] ? __alloc_pages_nodemask+0x632/0x750 [ 1505.676474] ? do_raw_spin_unlock+0x57/0x270 [ 1505.676494] memcg_kmem_charge_memcg+0x7c/0x130 [ 1505.684762] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1505.684777] ? cache_grow_begin+0x597/0x8c0 [ 1505.684790] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1505.684805] ? trace_hardirqs_on+0x67/0x220 [ 1505.684820] cache_grow_begin+0x3fa/0x8c0 [ 1505.695636] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1505.695649] ? __cpuset_node_allowed+0x136/0x540 [ 1505.695666] fallback_alloc+0x1fd/0x2d0 [ 1505.695684] ____cache_alloc_node+0x1be/0x1e0 [ 1505.704133] kmem_cache_alloc_node_trace+0xec/0x720 [ 1505.704146] ? lock_downgrade+0x810/0x810 [ 1505.704164] __kmalloc_node+0x3d/0x80 [ 1505.712893] kvmalloc_node+0x68/0x100 [ 1505.712912] xt_alloc_table_info+0x41/0xa0 [ 1505.712927] do_ip6t_set_ctl+0x25a/0x498 [ 1505.712943] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1505.721840] ? mutex_unlock+0xd/0x10 [ 1505.721853] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1505.721869] nf_setsockopt+0x77/0xd0 [ 1505.730580] ipv6_setsockopt+0x13e/0x170 [ 1505.730595] tcp_setsockopt+0x8f/0xe0 [ 1505.730614] sock_common_setsockopt+0x94/0xd0 [ 1505.738736] __sys_setsockopt+0x17a/0x280 [ 1505.738750] ? kernel_accept+0x310/0x310 [ 1505.738769] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1505.748637] ? do_syscall_64+0x26/0x620 [ 1505.748652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.748664] ? do_syscall_64+0x26/0x620 [ 1505.748680] __x64_sys_setsockopt+0xbe/0x150 [ 1505.748695] do_syscall_64+0xfd/0x620 [ 1505.757935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.757946] RIP: 0033:0x45c55a [ 1505.757959] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1505.757965] RSP: 002b:00007fff24dfe838 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1505.767452] RAX: ffffffffffffffda RBX: 00007fff24dfe860 RCX: 000000000045c55a [ 1505.767459] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1505.767466] RBP: 0000000000712cc0 R08: 00000000000002e8 R09: 0000000000004000 [ 1505.767474] R10: 0000000000711fa0 R11: 0000000000000202 R12: 0000000000000003 [ 1505.767482] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000711f40 [ 1505.769696] Task in [ 1505.787754] /syz5 [ 1505.813635] killed as a result of limit of [ 1505.827580] /syz5 [ 1505.856231] memory: usage 24920kB, limit 0kB, failcnt 24 [ 1505.856240] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1505.856248] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1505.856254] Memory cgroup stats for /syz5: cache:0KB rss:17472KB rss_huge:14336KB shmem:64KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:17392KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1505.856358] Memory cgroup out of memory: Kill process 28175 (syz-executor.5) score 10564000 or sacrifice child [ 1505.856974] Killed process 28175 (syz-executor.5) total-vm:72712kB, anon-rss:6312kB, file-rss:35792kB, shmem-rss:0kB [ 1505.954447] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1506.034439] syz-executor.5 cpuset= [ 1506.054996] syz5 mems_allowed=0-1 [ 1506.062661] CPU: 1 PID: 7900 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1506.069583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.069589] Call Trace: [ 1506.069608] dump_stack+0x172/0x1f0 [ 1506.069628] dump_header+0x15e/0xa55 [ 1506.069643] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1506.069656] ? ___ratelimit+0x60/0x595 [ 1506.069670] ? do_raw_spin_unlock+0x57/0x270 [ 1506.069686] oom_kill_process.cold+0x10/0x6ef [ 1506.069703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1506.069715] ? task_will_free_mem+0x139/0x6e0 [ 1506.069734] out_of_memory+0x936/0x12d0 [ 1506.081680] ? lock_downgrade+0x810/0x810 [ 1506.081698] ? oom_killer_disable+0x280/0x280 [ 1506.081711] ? find_held_lock+0x35/0x130 [ 1506.081735] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1506.081749] ? memcg_event_wake+0x230/0x230 [ 1506.081766] ? do_raw_spin_unlock+0x57/0x270 [ 1506.081779] ? _raw_spin_unlock+0x2d/0x50 [ 1506.081794] try_charge+0xef7/0x1480 [ 1506.089119] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1506.089139] ? rcu_read_lock_sched_held+0x110/0x130 [ 1506.089152] ? __alloc_pages_nodemask+0x632/0x750 [ 1506.089163] ? do_raw_spin_unlock+0x57/0x270 [ 1506.089186] memcg_kmem_charge_memcg+0x7c/0x130 [ 1506.098157] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1506.098169] ? cache_grow_begin+0x597/0x8c0 [ 1506.098181] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1506.098197] ? trace_hardirqs_on+0x67/0x220 [ 1506.098212] cache_grow_begin+0x3fa/0x8c0 [ 1506.098229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1506.107113] ? __cpuset_node_allowed+0x136/0x540 [ 1506.107132] fallback_alloc+0x1fd/0x2d0 [ 1506.107151] ____cache_alloc_node+0x1be/0x1e0 [ 1506.107169] kmem_cache_alloc_node_trace+0xec/0x720 [ 1506.107183] ? lock_downgrade+0x810/0x810 [ 1506.107200] __kmalloc_node+0x3d/0x80 [ 1506.117409] kvmalloc_node+0x68/0x100 [ 1506.117428] xt_alloc_table_info+0x41/0xa0 [ 1506.117445] do_ip6t_set_ctl+0x25a/0x498 [ 1506.117460] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1506.117482] ? mutex_unlock+0xd/0x10 [ 1506.117496] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1506.117512] nf_setsockopt+0x77/0xd0 [ 1506.125704] ipv6_setsockopt+0x13e/0x170 [ 1506.125720] tcp_setsockopt+0x8f/0xe0 [ 1506.125744] sock_common_setsockopt+0x94/0xd0 [ 1506.134289] __sys_setsockopt+0x17a/0x280 [ 1506.134303] ? kernel_accept+0x310/0x310 [ 1506.134321] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1506.134333] ? do_syscall_64+0x26/0x620 [ 1506.134346] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.134358] ? do_syscall_64+0x26/0x620 [ 1506.134373] __x64_sys_setsockopt+0xbe/0x150 [ 1506.134389] do_syscall_64+0xfd/0x620 [ 1506.143538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.143550] RIP: 0033:0x45c55a [ 1506.143562] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1506.143568] RSP: 002b:00007fff24dfe838 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1506.143582] RAX: ffffffffffffffda RBX: 00007fff24dfe860 RCX: 000000000045c55a [ 1506.143588] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1506.143596] RBP: 0000000000712cc0 R08: 00000000000002e8 R09: 0000000000004000 [ 1506.143604] R10: 0000000000711fa0 R11: 0000000000000202 R12: 0000000000000003 [ 1506.143612] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000711f40 [ 1506.144888] Task in [ 1506.156921] /syz5 [ 1506.166162] killed as a result of limit of [ 1506.175620] /syz5 [ 1506.198066] memory: usage 18456kB, limit 0kB, failcnt 30 [ 1506.198076] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1506.198086] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1506.213025] Memory cgroup stats for [ 1506.226905] /syz5 [ 1506.234999] : [ 1506.243042] cache:0KB rss:11156KB [ 1506.256096] rss_huge:8192KB [ 1506.265216] shmem:64KB [ 1506.277788] mapped_file:0KB [ 1506.286715] dirty:0KB [ 1506.300587] writeback:0KB [ 1506.309205] swap:0KB [ 1506.318361] inactive_anon:0KB [ 1506.340852] active_anon:11112KB [ 1506.363360] inactive_file:0KB [ 1506.378467] active_file:0KB [ 1506.390247] unevictable:0KB [ 1506.411664] Memory cgroup out of memory: Kill process 30427 (syz-executor.5) score 9557000 or sacrifice child [ 1506.424359] Killed process 30427 (syz-executor.5) total-vm:73372kB, anon-rss:2260kB, file-rss:35820kB, shmem-rss:0kB [ 1506.452118] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1506.460870] syz-executor.5 cpuset= [ 1506.474200] syz5 [ 1506.499323] mems_allowed=0-1 [ 1506.502988] CPU: 1 PID: 7900 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1506.509821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.509826] Call Trace: [ 1506.509846] dump_stack+0x172/0x1f0 [ 1506.509864] dump_header+0x15e/0xa55 [ 1506.509881] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1506.509895] ? ___ratelimit+0x60/0x595 [ 1506.509909] ? do_raw_spin_unlock+0x57/0x270 [ 1506.509925] oom_kill_process.cold+0x10/0x6ef [ 1506.509942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1506.509953] ? task_will_free_mem+0x139/0x6e0 [ 1506.509971] out_of_memory+0x936/0x12d0 [ 1506.521898] ? lock_downgrade+0x810/0x810 [ 1506.521915] ? oom_killer_disable+0x280/0x280 [ 1506.521929] ? find_held_lock+0x35/0x130 [ 1506.521952] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1506.521966] ? memcg_event_wake+0x230/0x230 [ 1506.529480] ? do_raw_spin_unlock+0x57/0x270 [ 1506.529496] ? _raw_spin_unlock+0x2d/0x50 [ 1506.529512] try_charge+0xef7/0x1480 [ 1506.529532] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1506.529550] ? rcu_read_lock_sched_held+0x110/0x130 [ 1506.529563] ? __alloc_pages_nodemask+0x632/0x750 [ 1506.529575] ? do_raw_spin_unlock+0x57/0x270 [ 1506.529595] memcg_kmem_charge_memcg+0x7c/0x130 [ 1506.529610] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1506.538759] ? cache_grow_begin+0x597/0x8c0 [ 1506.538774] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1506.538789] ? trace_hardirqs_on+0x67/0x220 [ 1506.538805] cache_grow_begin+0x3fa/0x8c0 [ 1506.538821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1506.538834] ? __cpuset_node_allowed+0x136/0x540 [ 1506.538848] fallback_alloc+0x1fd/0x2d0 [ 1506.538865] ____cache_alloc_node+0x1be/0x1e0 [ 1506.547779] kmem_cache_alloc_node_trace+0xec/0x720 [ 1506.547795] ? lock_downgrade+0x810/0x810 [ 1506.547811] __kmalloc_node+0x3d/0x80 [ 1506.547826] kvmalloc_node+0x68/0x100 [ 1506.547852] xt_alloc_table_info+0x41/0xa0 [ 1506.547869] do_ip6t_set_ctl+0x25a/0x498 [ 1506.547884] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1506.547904] ? mutex_unlock+0xd/0x10 [ 1506.547917] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1506.547933] nf_setsockopt+0x77/0xd0 [ 1506.557985] ipv6_setsockopt+0x13e/0x170 [ 1506.558002] tcp_setsockopt+0x8f/0xe0 [ 1506.558019] sock_common_setsockopt+0x94/0xd0 [ 1506.558033] __sys_setsockopt+0x17a/0x280 [ 1506.558045] ? kernel_accept+0x310/0x310 [ 1506.558070] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1506.558083] ? do_syscall_64+0x26/0x620 [ 1506.558095] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.558110] ? do_syscall_64+0x26/0x620 [ 1506.567383] __x64_sys_setsockopt+0xbe/0x150 [ 1506.567400] do_syscall_64+0xfd/0x620 [ 1506.567418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.567427] RIP: 0033:0x45c55a [ 1506.567439] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1506.567446] RSP: 002b:00007fff24dfe838 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1506.567459] RAX: ffffffffffffffda RBX: 00007fff24dfe860 RCX: 000000000045c55a [ 1506.567465] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1506.567473] RBP: 0000000000712cc0 R08: 00000000000002e8 R09: 0000000000004000 [ 1506.567479] R10: 0000000000711fa0 R11: 0000000000000202 R12: 0000000000000003 [ 1506.567486] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000711f40 [ 1506.576360] Task in [ 1506.582305] /syz5 [ 1506.595668] killed as a result of limit of [ 1506.603326] /syz5 [ 1506.603358] memory: usage 15940kB, limit 0kB, failcnt 36 [ 1506.603366] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1506.603373] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1506.603379] Memory cgroup stats for /syz5 [ 1506.618556] : [ 1506.627687] cache:0KB [ 1506.642101] rss:8972KB [ 1506.651407] rss_huge:6144KB [ 1506.665516] shmem:64KB [ 1506.678080] mapped_file:0KB [ 1506.682223] dirty:0KB writeback:0KB [ 1506.692642] swap:0KB [ 1506.702805] inactive_anon:0KB [ 1506.711116] active_anon:8892KB [ 1506.720327] inactive_file:0KB [ 1506.727653] active_file:0KB [ 1506.738406] unevictable:0KB [ 1506.753267] Memory cgroup out of memory: Kill process 1137 (syz-executor.5) score 9542000 or sacrifice child [ 1506.753328] Killed process 1137 (syz-executor.5) total-vm:72580kB, anon-rss:2208kB, file-rss:35816kB, shmem-rss:0kB [ 1506.788063] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1506.801978] syz-executor.5 cpuset= [ 1506.820206] syz5 [ 1506.830070] mems_allowed=0-1 [ 1506.840127] CPU: 1 PID: 7900 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1506.846426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.846432] Call Trace: [ 1506.846451] dump_stack+0x172/0x1f0 [ 1506.846470] dump_header+0x15e/0xa55 [ 1506.846485] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1506.846500] ? ___ratelimit+0x60/0x595 [ 1506.846514] ? do_raw_spin_unlock+0x57/0x270 [ 1506.846530] oom_kill_process.cold+0x10/0x6ef [ 1506.846547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1506.846558] ? task_will_free_mem+0x139/0x6e0 [ 1506.846576] out_of_memory+0x936/0x12d0 [ 1506.859460] ? lock_downgrade+0x810/0x810 [ 1506.859476] ? oom_killer_disable+0x280/0x280 [ 1506.859489] ? find_held_lock+0x35/0x130 [ 1506.859513] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1506.867842] ? memcg_event_wake+0x230/0x230 [ 1506.867864] ? do_raw_spin_unlock+0x57/0x270 [ 1506.867881] ? _raw_spin_unlock+0x2d/0x50 [ 1506.867897] try_charge+0xef7/0x1480 [ 1506.873525] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1506.873544] ? rcu_read_lock_sched_held+0x110/0x130 [ 1506.873559] ? __alloc_pages_nodemask+0x632/0x750 [ 1506.873574] ? do_raw_spin_unlock+0x57/0x270 [ 1506.879187] memcg_kmem_charge_memcg+0x7c/0x130 [ 1506.879201] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1506.879215] ? cache_grow_begin+0x597/0x8c0 [ 1506.879228] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1506.879243] ? trace_hardirqs_on+0x67/0x220 [ 1506.879257] cache_grow_begin+0x3fa/0x8c0 [ 1506.879274] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1506.879287] ? __cpuset_node_allowed+0x136/0x540 [ 1506.879302] fallback_alloc+0x1fd/0x2d0 [ 1506.885493] ____cache_alloc_node+0x1be/0x1e0 [ 1506.885510] kmem_cache_alloc_node_trace+0xec/0x720 [ 1506.885522] ? lock_downgrade+0x810/0x810 [ 1506.885541] __kmalloc_node+0x3d/0x80 [ 1506.885556] kvmalloc_node+0x68/0x100 [ 1506.885576] xt_alloc_table_info+0x41/0xa0 [ 1506.885594] do_ip6t_set_ctl+0x25a/0x498 [ 1506.885610] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1506.892060] ? mutex_unlock+0xd/0x10 [ 1506.892074] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1506.892091] nf_setsockopt+0x77/0xd0 [ 1506.892107] ipv6_setsockopt+0x13e/0x170 [ 1506.892123] tcp_setsockopt+0x8f/0xe0 [ 1506.898330] sock_common_setsockopt+0x94/0xd0 [ 1506.898346] __sys_setsockopt+0x17a/0x280 [ 1506.898361] ? kernel_accept+0x310/0x310 [ 1506.898381] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1506.898394] ? do_syscall_64+0x26/0x620 [ 1506.898410] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.911370] ? do_syscall_64+0x26/0x620 [ 1506.911388] __x64_sys_setsockopt+0xbe/0x150 [ 1506.911406] do_syscall_64+0xfd/0x620 [ 1506.911421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.911431] RIP: 0033:0x45c55a [ 1506.911444] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1506.911451] RSP: 002b:00007fff24dfe838 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1506.911464] RAX: ffffffffffffffda RBX: 00007fff24dfe860 RCX: 000000000045c55a [ 1506.911471] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1506.911477] RBP: 0000000000712cc0 R08: 00000000000002e8 R09: 0000000000004000 [ 1506.911488] R10: 0000000000711fa0 R11: 0000000000000202 R12: 0000000000000003 [ 1506.934348] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000711f40 [ 1506.940617] Task in [ 1506.951922] /syz5 [ 1506.969059] killed as a result of limit of [ 1506.976898] /syz5 [ 1506.995705] memory: usage 13584kB, limit 0kB, failcnt 42 [ 1507.003546] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1507.003555] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1507.003561] Memory cgroup stats for /syz5: cache:0KB rss:6752KB [ 1507.017974] rss_huge:4096KB [ 1507.027145] shmem:64KB [ 1507.039215] mapped_file:0KB [ 1507.049875] dirty:0KB [ 1507.062583] writeback:0KB [ 1507.068653] swap:0KB [ 1507.081204] inactive_anon:0KB [ 1507.086421] active_anon:6716KB [ 1507.100802] inactive_file:0KB [ 1507.110639] active_file:0KB [ 1507.122060] unevictable:0KB [ 1507.145463] Memory cgroup out of memory: Kill process 27131 (syz-executor.5) score 9535000 or sacrifice child [ 1507.152871] Killed process 27131 (syz-executor.5) total-vm:72580kB, anon-rss:2200kB, file-rss:35796kB, shmem-rss:0kB [ 1507.383559] bond0 (unregistering): Released all slaves [ 1507.400272] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1507.413621] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1507.419241] CPU: 1 PID: 7900 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1507.426355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.435726] Call Trace: [ 1507.438316] dump_stack+0x172/0x1f0 [ 1507.442214] dump_header+0x15e/0xa55 [ 1507.445962] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1507.451117] ? ___ratelimit+0x60/0x595 [ 1507.455122] ? do_raw_spin_unlock+0x57/0x270 [ 1507.459541] oom_kill_process.cold+0x10/0x6ef [ 1507.464326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1507.469896] ? task_will_free_mem+0x139/0x6e0 [ 1507.474600] out_of_memory+0x936/0x12d0 [ 1507.478624] ? lock_downgrade+0x810/0x810 [ 1507.482800] ? oom_killer_disable+0x280/0x280 [ 1507.487669] ? find_held_lock+0x35/0x130 [ 1507.491864] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1507.496734] ? memcg_event_wake+0x230/0x230 [ 1507.501072] ? do_raw_spin_unlock+0x57/0x270 [ 1507.505515] ? _raw_spin_unlock+0x2d/0x50 [ 1507.509670] try_charge+0xef7/0x1480 [ 1507.513399] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1507.518252] ? rcu_read_lock_sched_held+0x110/0x130 [ 1507.523362] ? __alloc_pages_nodemask+0x632/0x750 [ 1507.528223] ? do_raw_spin_unlock+0x57/0x270 [ 1507.532742] memcg_kmem_charge_memcg+0x7c/0x130 [ 1507.537419] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1507.542091] ? cache_grow_begin+0x597/0x8c0 [ 1507.546415] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1507.551021] ? trace_hardirqs_on+0x67/0x220 [ 1507.555380] cache_grow_begin+0x3fa/0x8c0 [ 1507.559543] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1507.565101] ? __cpuset_node_allowed+0x136/0x540 [ 1507.569882] fallback_alloc+0x1fd/0x2d0 [ 1507.573887] ____cache_alloc_node+0x1be/0x1e0 [ 1507.578411] kmem_cache_alloc_node_trace+0xec/0x720 [ 1507.583440] ? lock_downgrade+0x810/0x810 [ 1507.587697] __kmalloc_node+0x3d/0x80 [ 1507.591522] kvmalloc_node+0x68/0x100 [ 1507.595343] xt_alloc_table_info+0x41/0xa0 [ 1507.599695] do_ip6t_set_ctl+0x25a/0x498 [ 1507.603868] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1507.608719] ? mutex_unlock+0xd/0x10 [ 1507.612439] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1507.617724] nf_setsockopt+0x77/0xd0 [ 1507.621465] ipv6_setsockopt+0x13e/0x170 [ 1507.625556] tcp_setsockopt+0x8f/0xe0 [ 1507.629376] sock_common_setsockopt+0x94/0xd0 [ 1507.633886] __sys_setsockopt+0x17a/0x280 [ 1507.638049] ? kernel_accept+0x310/0x310 [ 1507.642119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1507.646888] ? do_syscall_64+0x26/0x620 [ 1507.650878] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.656266] ? do_syscall_64+0x26/0x620 [ 1507.660250] __x64_sys_setsockopt+0xbe/0x150 [ 1507.664678] do_syscall_64+0xfd/0x620 [ 1507.668494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.673716] RIP: 0033:0x45c55a [ 1507.676925] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1507.695860] RSP: 002b:00007fff24dfe838 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1507.703712] RAX: ffffffffffffffda RBX: 00007fff24dfe860 RCX: 000000000045c55a [ 1507.711358] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1507.718827] RBP: 0000000000712cc0 R08: 00000000000002e8 R09: 0000000000004000 [ 1507.726194] R10: 0000000000711fa0 R11: 0000000000000202 R12: 0000000000000003 [ 1507.733475] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000711f40 [ 1507.742088] Task in /syz5 killed as a result of limit of /syz5 [ 1507.752448] memory: usage 11248kB, limit 0kB, failcnt 48 [ 1507.763549] IPVS: ftp: loaded support on port[0] = 21 [ 1507.773040] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1507.784784] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1507.791161] Memory cgroup stats for /syz5: cache:0KB rss:4632KB rss_huge:2048KB shmem:64KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4556KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1507.841611] Memory cgroup out of memory: Kill process 24706 (syz-executor.5) score 9295000 or sacrifice child [ 1507.868077] Killed process 24706 (syz-executor.5) total-vm:72844kB, anon-rss:2228kB, file-rss:34816kB, shmem-rss:0kB [ 1507.905404] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1507.929639] chnl_net:caif_netlink_parms(): no params data found [ 1507.942102] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1507.947783] CPU: 1 PID: 7900 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1507.947791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.947795] Call Trace: [ 1507.947813] dump_stack+0x172/0x1f0 [ 1507.947833] dump_header+0x15e/0xa55 [ 1507.947851] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1507.947867] ? ___ratelimit+0x60/0x595 [ 1507.947881] ? do_raw_spin_unlock+0x57/0x270 [ 1507.947899] oom_kill_process.cold+0x10/0x6ef [ 1507.947917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1507.947930] ? task_will_free_mem+0x139/0x6e0 [ 1507.947951] out_of_memory+0x936/0x12d0 [ 1507.947966] ? lock_downgrade+0x810/0x810 [ 1507.947983] ? oom_killer_disable+0x280/0x280 [ 1507.947997] ? find_held_lock+0x35/0x130 [ 1507.948020] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1507.948034] ? memcg_event_wake+0x230/0x230 [ 1507.948052] ? do_raw_spin_unlock+0x57/0x270 [ 1507.948064] ? _raw_spin_unlock+0x2d/0x50 [ 1507.948079] try_charge+0xef7/0x1480 [ 1507.964834] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1507.964855] ? rcu_read_lock_sched_held+0x110/0x130 [ 1507.964867] ? __alloc_pages_nodemask+0x632/0x750 [ 1507.964879] ? do_raw_spin_unlock+0x57/0x270 [ 1507.964896] memcg_kmem_charge_memcg+0x7c/0x130 [ 1507.964907] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1507.964918] ? cache_grow_begin+0x597/0x8c0 [ 1507.964930] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1507.964945] ? trace_hardirqs_on+0x67/0x220 [ 1507.964961] cache_grow_begin+0x3fa/0x8c0 [ 1507.964975] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1507.964987] ? __cpuset_node_allowed+0x136/0x540 [ 1507.965002] fallback_alloc+0x1fd/0x2d0 [ 1507.971205] ____cache_alloc_node+0x1be/0x1e0 [ 1507.971224] kmem_cache_alloc_node_trace+0xec/0x720 [ 1507.971238] ? lock_downgrade+0x810/0x810 [ 1507.971255] __kmalloc_node+0x3d/0x80 [ 1507.971271] kvmalloc_node+0x68/0x100 [ 1507.980178] xt_alloc_table_info+0x41/0xa0 [ 1507.980196] do_ip6t_set_ctl+0x25a/0x498 [ 1507.980212] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1507.980236] ? mutex_unlock+0xd/0x10 [ 1507.980250] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1507.980267] nf_setsockopt+0x77/0xd0 [ 1507.980284] ipv6_setsockopt+0x13e/0x170 [ 1507.980301] tcp_setsockopt+0x8f/0xe0 [ 1507.988783] sock_common_setsockopt+0x94/0xd0 [ 1507.988799] __sys_setsockopt+0x17a/0x280 [ 1507.988812] ? kernel_accept+0x310/0x310 [ 1507.988832] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1507.988844] ? do_syscall_64+0x26/0x620 [ 1507.988856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.988871] ? do_syscall_64+0x26/0x620 [ 1507.998909] __x64_sys_setsockopt+0xbe/0x150 [ 1507.998927] do_syscall_64+0xfd/0x620 [ 1507.998944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.998953] RIP: 0033:0x45c55a [ 1507.998966] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1507.998972] RSP: 002b:00007fff24dfe838 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1507.998986] RAX: ffffffffffffffda RBX: 00007fff24dfe860 RCX: 000000000045c55a [ 1507.998993] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1507.999001] RBP: 0000000000712cc0 R08: 00000000000002e8 R09: 0000000000004000 [ 1507.999007] R10: 0000000000711fa0 R11: 0000000000000202 R12: 0000000000000003 [ 1507.999014] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000711f40 [ 1508.024497] Task in [ 1508.029933] /syz5 [ 1508.047697] killed as a result of limit of [ 1508.062832] /syz5 [ 1508.085082] memory: usage 10956kB, limit 0kB, failcnt 54 [ 1508.095323] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1508.103170] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1508.120005] Memory cgroup stats for [ 1508.126268] /syz5 [ 1508.132901] : [ 1508.145759] cache:0KB [ 1508.150605] rss:4496KB [ 1508.164676] rss_huge:2048KB [ 1508.171313] shmem:64KB [ 1508.186168] mapped_file:0KB [ 1508.199541] dirty:0KB [ 1508.207711] writeback:0KB [ 1508.239823] swap:0KB [ 1508.254121] inactive_anon:0KB [ 1508.264365] active_anon:4432KB [ 1508.273557] inactive_file:0KB [ 1508.285980] active_file:0KB [ 1508.324278] unevictable:0KB [ 1508.341897] Memory cgroup out of memory: Kill process 27352 (syz-executor.5) score 9290000 or sacrifice child [ 1508.356050] Killed process 27352 (syz-executor.5) total-vm:72580kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 1508.374835] oom_reaper: reaped process 27352 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1508.376150] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1508.405388] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1508.410996] CPU: 0 PID: 7900 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1508.417855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1508.417861] Call Trace: [ 1508.417881] dump_stack+0x172/0x1f0 [ 1508.417900] dump_header+0x15e/0xa55 [ 1508.417917] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1508.417932] ? ___ratelimit+0x60/0x595 [ 1508.417945] ? do_raw_spin_unlock+0x57/0x270 [ 1508.417961] oom_kill_process.cold+0x10/0x6ef [ 1508.417979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.417992] ? task_will_free_mem+0x139/0x6e0 [ 1508.418010] out_of_memory+0x936/0x12d0 [ 1508.429949] ? lock_downgrade+0x810/0x810 [ 1508.437268] ? oom_killer_disable+0x280/0x280 [ 1508.437281] ? find_held_lock+0x35/0x130 [ 1508.437304] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1508.437317] ? memcg_event_wake+0x230/0x230 [ 1508.437334] ? do_raw_spin_unlock+0x57/0x270 [ 1508.437351] ? _raw_spin_unlock+0x2d/0x50 [ 1508.446310] try_charge+0xef7/0x1480 [ 1508.446332] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1508.446349] ? rcu_read_lock_sched_held+0x110/0x130 [ 1508.446360] ? __alloc_pages_nodemask+0x632/0x750 [ 1508.446372] ? do_raw_spin_unlock+0x57/0x270 [ 1508.446390] memcg_kmem_charge_memcg+0x7c/0x130 [ 1508.446404] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1508.455275] ? cache_grow_begin+0x597/0x8c0 [ 1508.455289] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1508.455305] ? trace_hardirqs_on+0x67/0x220 [ 1508.455321] cache_grow_begin+0x3fa/0x8c0 [ 1508.465446] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1508.465459] ? __cpuset_node_allowed+0x136/0x540 [ 1508.465474] fallback_alloc+0x1fd/0x2d0 [ 1508.465490] ____cache_alloc_node+0x1be/0x1e0 [ 1508.465505] kmem_cache_alloc_node_trace+0xec/0x720 [ 1508.465518] ? lock_downgrade+0x810/0x810 [ 1508.465536] __kmalloc_node+0x3d/0x80 [ 1508.473651] kvmalloc_node+0x68/0x100 [ 1508.482186] xt_alloc_table_info+0x41/0xa0 [ 1508.491330] do_ip6t_set_ctl+0x25a/0x498 [ 1508.499880] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1508.508430] ? mutex_unlock+0xd/0x10 [ 1508.518262] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1508.518278] nf_setsockopt+0x77/0xd0 [ 1508.518295] ipv6_setsockopt+0x13e/0x170 [ 1508.518310] tcp_setsockopt+0x8f/0xe0 [ 1508.518328] sock_common_setsockopt+0x94/0xd0 [ 1508.518342] __sys_setsockopt+0x17a/0x280 [ 1508.527514] ? kernel_accept+0x310/0x310 [ 1508.536353] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1508.536364] ? do_syscall_64+0x26/0x620 [ 1508.536378] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1508.536389] ? do_syscall_64+0x26/0x620 [ 1508.536404] __x64_sys_setsockopt+0xbe/0x150 [ 1508.536417] do_syscall_64+0xfd/0x620 [ 1508.536431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1508.536440] RIP: 0033:0x45c55a [ 1508.536452] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1508.536462] RSP: 002b:00007fff24dfe838 EFLAGS: 00000202 [ 1508.545343] ORIG_RAX: 0000000000000036 [ 1508.545351] RAX: ffffffffffffffda RBX: 00007fff24dfe860 RCX: 000000000045c55a [ 1508.545357] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1508.545363] RBP: 0000000000712cc0 R08: 00000000000002e8 R09: 0000000000004000 [ 1508.545370] R10: 0000000000711fa0 R11: 0000000000000202 R12: 0000000000000003 [ 1508.545377] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000711f40 [ 1508.546762] Task in [ 1508.560126] /syz5 [ 1508.568852] killed as a result of limit of [ 1508.581815] /syz5 [ 1508.602477] memory: usage 8564kB, limit 0kB, failcnt 60 [ 1508.615849] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1508.624089] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1508.637491] Memory cgroup stats for [ 1508.647002] /syz5 [ 1508.674288] : [ 1508.704273] cache:0KB [ 1508.749878] rss:2332KB [ 1508.764267] rss_huge:0KB [ 1508.769214] shmem:64KB [ 1508.773447] mapped_file:0KB [ 1508.785875] dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2248KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1508.806470] Memory cgroup out of memory: Kill process 24693 (syz-executor.5) score 9287000 or sacrifice child [ 1508.822729] bridge0: port 1(bridge_slave_0) entered blocking state [ 1508.829370] bridge0: port 1(bridge_slave_0) entered disabled state [ 1508.832007] Killed process 24693 (syz-executor.5) total-vm:72580kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 1508.847683] device bridge_slave_0 entered promiscuous mode [ 1508.855938] bridge0: port 2(bridge_slave_1) entered blocking state [ 1508.862649] bridge0: port 2(bridge_slave_1) entered disabled state [ 1508.870687] device bridge_slave_1 entered promiscuous mode [ 1508.884548] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1508.903933] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1508.913170] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1508.920140] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1508.929472] CPU: 1 PID: 7900 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1508.936344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1508.945686] Call Trace: [ 1508.948278] dump_stack+0x172/0x1f0 [ 1508.951898] dump_header+0x15e/0xa55 [ 1508.955607] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1508.960705] ? ___ratelimit+0x60/0x595 [ 1508.964585] ? do_raw_spin_unlock+0x57/0x270 [ 1508.968989] oom_kill_process.cold+0x10/0x6ef [ 1508.973479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.979010] ? task_will_free_mem+0x139/0x6e0 [ 1508.983501] out_of_memory+0x936/0x12d0 [ 1508.987469] ? lock_downgrade+0x810/0x810 [ 1508.991610] ? oom_killer_disable+0x280/0x280 [ 1508.996096] ? find_held_lock+0x35/0x130 [ 1509.000166] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1509.005122] ? memcg_event_wake+0x230/0x230 [ 1509.009465] ? do_raw_spin_unlock+0x57/0x270 [ 1509.013898] ? _raw_spin_unlock+0x2d/0x50 [ 1509.018304] try_charge+0xef7/0x1480 [ 1509.022030] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1509.026973] ? rcu_read_lock_sched_held+0x110/0x130 [ 1509.031988] ? __alloc_pages_nodemask+0x632/0x750 [ 1509.036824] ? do_raw_spin_unlock+0x57/0x270 [ 1509.041328] memcg_kmem_charge_memcg+0x7c/0x130 [ 1509.046600] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1509.051087] ? cache_grow_begin+0x597/0x8c0 [ 1509.055400] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1509.059973] ? trace_hardirqs_on+0x67/0x220 [ 1509.064288] cache_grow_begin+0x3fa/0x8c0 [ 1509.068526] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1509.074173] ? __cpuset_node_allowed+0x136/0x540 [ 1509.078926] fallback_alloc+0x1fd/0x2d0 [ 1509.082896] ____cache_alloc_node+0x1be/0x1e0 [ 1509.087389] kmem_cache_alloc_node_trace+0xec/0x720 [ 1509.092418] ? lock_downgrade+0x810/0x810 [ 1509.096642] __kmalloc_node+0x3d/0x80 [ 1509.100457] kvmalloc_node+0x68/0x100 [ 1509.104260] xt_alloc_table_info+0x41/0xa0 [ 1509.108490] do_ip6t_set_ctl+0x25a/0x498 [ 1509.112558] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1509.117399] ? mutex_unlock+0xd/0x10 [ 1509.121108] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1509.126554] nf_setsockopt+0x77/0xd0 [ 1509.130350] ipv6_setsockopt+0x13e/0x170 [ 1509.134414] tcp_setsockopt+0x8f/0xe0 [ 1509.138235] sock_common_setsockopt+0x94/0xd0 [ 1509.142737] __sys_setsockopt+0x17a/0x280 [ 1509.147057] ? kernel_accept+0x310/0x310 [ 1509.151114] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1509.155977] ? do_syscall_64+0x26/0x620 [ 1509.159960] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.165328] ? do_syscall_64+0x26/0x620 [ 1509.169311] __x64_sys_setsockopt+0xbe/0x150 [ 1509.173711] do_syscall_64+0xfd/0x620 [ 1509.177517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.182698] RIP: 0033:0x45c55a [ 1509.185880] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1509.204771] RSP: 002b:00007fff24dfe838 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1509.212485] RAX: ffffffffffffffda RBX: 00007fff24dfe860 RCX: 000000000045c55a [ 1509.219749] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1509.227029] RBP: 0000000000712cc0 R08: 00000000000002e8 R09: 0000000000004000 [ 1509.234292] R10: 0000000000711fa0 R11: 0000000000000202 R12: 0000000000000003 [ 1509.241569] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000711f40 [ 1509.258798] Task in /syz5 killed as a result of limit of /syz5 [ 1509.265149] memory: usage 6044kB, limit 0kB, failcnt 66 [ 1509.270527] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1509.277481] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1509.283636] Memory cgroup stats for /syz5: cache:0KB rss:168KB rss_huge:0KB shmem:64KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:76KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1509.283735] Memory cgroup out of memory: Kill process 7900 (syz-executor.5) score 9007000 or sacrifice child [ 1509.313992] Killed process 7900 (syz-executor.5) total-vm:72448kB, anon-rss:116kB, file-rss:35776kB, shmem-rss:0kB [ 1509.330577] oom_reaper: reaped process 7900 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 1509.390511] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1509.398582] team0: Port device team_slave_0 added [ 1509.404792] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1509.412394] team0: Port device team_slave_1 added [ 1509.418074] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1509.425731] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1509.496746] device hsr_slave_0 entered promiscuous mode [ 1509.544818] device hsr_slave_1 entered promiscuous mode [ 1509.580839] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1509.591723] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1509.655468] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1509.801480] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1509.817713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1509.832550] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1509.843984] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1509.851949] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1509.862814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1509.870522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1509.880946] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1509.887778] 8021q: adding VLAN 0 to HW filter on device team0 [ 1509.899642] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1509.907617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1509.916871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1509.925753] bridge0: port 1(bridge_slave_0) entered blocking state [ 1509.932125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1509.941844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1509.950548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1509.959112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1509.967611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1509.979463] bridge0: port 2(bridge_slave_1) entered blocking state [ 1509.985888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1510.002067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1510.011224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1510.040735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1510.049761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1510.071117] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1510.085637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1510.100541] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1510.112894] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1510.128353] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1510.140071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1510.152660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1510.166715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1510.181474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1510.190751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1510.207233] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1510.222504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1510.231929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1510.248417] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1510.261089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1510.284678] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1510.300799] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1510.429178] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1510.448435] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1510.456586] CPU: 0 PID: 30744 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1510.463555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.472938] Call Trace: [ 1510.475540] dump_stack+0x172/0x1f0 [ 1510.479182] dump_header+0x15e/0xa55 [ 1510.482908] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1510.488037] ? ___ratelimit+0x60/0x595 [ 1510.491936] ? do_raw_spin_unlock+0x57/0x270 [ 1510.496372] oom_kill_process.cold+0x10/0x6ef [ 1510.500897] out_of_memory+0x936/0x12d0 [ 1510.504887] ? oom_killer_disable+0x280/0x280 [ 1510.509393] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1510.514230] ? memcg_event_wake+0x230/0x230 [ 1510.518577] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1510.523688] ? cgroup_file_notify+0x140/0x1b0 [ 1510.528225] memory_max_write+0x169/0x300 [ 1510.532391] ? mem_cgroup_write+0x360/0x360 [ 1510.536713] cgroup_file_write+0x241/0x790 [ 1510.541070] ? mem_cgroup_write+0x360/0x360 [ 1510.545403] ? kill_css+0x380/0x380 [ 1510.549194] ? kill_css+0x380/0x380 [ 1510.552977] kernfs_fop_write+0x2b8/0x480 [ 1510.557140] __vfs_write+0x114/0x810 [ 1510.560850] ? kernfs_fop_open+0xd80/0xd80 [ 1510.565093] ? kernel_read+0x120/0x120 [ 1510.568992] ? __lock_is_held+0xb6/0x140 [ 1510.573054] ? rcu_read_lock_sched_held+0x110/0x130 [ 1510.578070] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1510.582818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1510.588369] ? __sb_start_write+0x1a9/0x360 [ 1510.592685] vfs_write+0x20c/0x560 [ 1510.596221] ksys_write+0x14f/0x2d0 [ 1510.599856] ? __ia32_sys_read+0xb0/0xb0 [ 1510.604046] ? do_syscall_64+0x26/0x620 [ 1510.608030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.613394] ? do_syscall_64+0x26/0x620 [ 1510.617376] __x64_sys_write+0x73/0xb0 [ 1510.621342] do_syscall_64+0xfd/0x620 [ 1510.625163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.630577] RIP: 0033:0x459a29 [ 1510.633759] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1510.652664] RSP: 002b:00007fefb81fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1510.660382] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1510.667668] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1510.675446] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1510.682705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fefb81fe6d4 [ 1510.690056] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1510.702879] Task in /syz2 killed as a result of limit of /syz2 [ 1510.711380] memory: usage 3240kB, limit 0kB, failcnt 271907 [ 1510.722077] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1510.731646] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1510.743940] Memory cgroup stats for /syz2: cache:156KB rss:2128KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1510.774610] Memory cgroup out of memory: Kill process 30743 (syz-executor.2) score 9272000 or sacrifice child [ 1510.786512] Killed process 30743 (syz-executor.2) total-vm:72584kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 1510.802063] oom_reaper: reaped process 30743 (syz-executor.2), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 03:48:54 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:54 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000f00000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:48:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xee0}], 0x1}}], 0x2, 0x0, 0x0) 03:48:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x2, 0x2, 0xfa, 0x90, 0x0, 0x81, 0x1c000, 0xfba1acf973e78603, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x42e, 0x1, @perf_config_ext={0x3, 0x915d}, 0x8000, 0xfffffffffffffffe, 0x5, 0x5, 0x4, 0x3, 0x7e0}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) 03:48:54 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:54 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1511.061967] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1511.065461] Left network mode [ 1511.073173] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1511.081731] CPU: 1 PID: 30738 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1511.088669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1511.098069] Call Trace: [ 1511.100682] dump_stack+0x172/0x1f0 [ 1511.104335] dump_header+0x15e/0xa55 [ 1511.108077] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1511.113204] ? ___ratelimit+0x60/0x595 [ 1511.117261] ? do_raw_spin_unlock+0x57/0x270 [ 1511.121720] oom_kill_process.cold+0x10/0x6ef [ 1511.126272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1511.131835] ? task_will_free_mem+0x139/0x6e0 [ 1511.136394] out_of_memory+0x936/0x12d0 [ 1511.140485] ? lock_downgrade+0x810/0x810 [ 1511.144660] ? oom_killer_disable+0x280/0x280 [ 1511.149177] ? find_held_lock+0x35/0x130 [ 1511.153270] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1511.158140] ? memcg_event_wake+0x230/0x230 [ 1511.162496] ? do_raw_spin_unlock+0x57/0x270 [ 1511.166926] ? _raw_spin_unlock+0x2d/0x50 [ 1511.171101] try_charge+0xef7/0x1480 [ 1511.174841] ? find_held_lock+0x35/0x130 [ 1511.178926] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1511.183793] ? kasan_check_read+0x11/0x20 [ 1511.187966] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1511.192822] mem_cgroup_try_charge+0x259/0x6b0 [ 1511.197430] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1511.202386] wp_page_copy+0x430/0x16a0 [ 1511.206308] ? pmd_pfn+0x1d0/0x1d0 [ 1511.209865] ? kasan_check_read+0x11/0x20 [ 1511.214032] ? do_raw_spin_unlock+0x57/0x270 [ 1511.218465] do_wp_page+0x57d/0x10b0 [ 1511.222468] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1511.227160] ? kasan_check_write+0x14/0x20 [ 1511.231419] ? do_raw_spin_lock+0xc8/0x240 [ 1511.235687] __handle_mm_fault+0x2305/0x3f80 [ 1511.240123] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1511.245000] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1511.249695] handle_mm_fault+0x1b5/0x690 [ 1511.253778] __do_page_fault+0x62a/0xe90 [ 1511.257866] ? vmalloc_fault+0x740/0x740 [ 1511.261950] ? trace_hardirqs_off_caller+0x65/0x220 [ 1511.267025] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1511.271982] ? page_fault+0x8/0x30 [ 1511.275543] do_page_fault+0x71/0x57d [ 1511.279430] ? page_fault+0x8/0x30 [ 1511.283083] page_fault+0x1e/0x30 [ 1511.286549] RIP: 0033:0x430b06 [ 1511.289755] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1511.308850] RSP: 002b:00007fff1af081b0 EFLAGS: 00010206 [ 1511.314222] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1511.321727] RDX: 000055555592a930 RSI: 0000555555932970 RDI: 0000000000000003 [ 1511.329121] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555929940 [ 1511.336419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1511.343776] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1511.364356] Task in /syz2 killed as a result of limit of /syz2 [ 1511.370490] memory: usage 912kB, limit 0kB, failcnt 271915 [ 1511.392266] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 03:48:55 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:55 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1511.413658] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1511.432001] Memory cgroup stats for /syz2: cache:156KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1511.465914] Memory cgroup out of memory: Kill process 30738 (syz-executor.2) score 8757000 or sacrifice child [ 1511.482170] Killed process 30738 (syz-executor.2) total-vm:72452kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 1511.502421] oom_reaper: reaped process 30738 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:48:55 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:55 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:55 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:55 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:55 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:55 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xee8}], 0x1}}], 0x2, 0x0, 0x0) 03:48:55 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/sequencer\x00', 0x105000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000740)={@in6={{0xa, 0x4e22, 0x9b, @mcast1}}, 0x0, 0xc680, 0x0, "1dcddd8cae7b77d08fd884dc7da3a19b57cf7c76b617f8897fce5c1ddf5e751859f95c8966fbef774f3fda3ac38af312a3163f22072cd6149b2d67f0d4219b6669845d7ff079870a38142bea9a85aa1c"}, 0xd8) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) write(r2, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1512.065525] device team0 left promiscuous mode [ 1512.070257] device team_slave_0 left promiscuous mode [ 1512.123253] device team_slave_1 left promiscuous mode [ 1512.142978] bridge0: port 3(team0) entered disabled state [ 1512.225171] device bridge_slave_1 left promiscuous mode [ 1512.230779] bridge0: port 2(bridge_slave_1) entered disabled state [ 1512.300632] device bridge_slave_0 left promiscuous mode [ 1512.319227] bridge0: port 1(bridge_slave_0) entered disabled state [ 1512.645913] device hsr_slave_1 left promiscuous mode [ 1512.702410] device hsr_slave_0 left promiscuous mode [ 1512.763513] team0 (unregistering): Port device team_slave_1 removed [ 1512.794092] team0 (unregistering): Port device team_slave_0 removed [ 1512.823920] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1512.893026] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1513.168890] bond0 (unregistering): Released all slaves [ 1513.643671] IPVS: ftp: loaded support on port[0] = 21 [ 1513.803984] chnl_net:caif_netlink_parms(): no params data found [ 1513.872947] bridge0: port 1(bridge_slave_0) entered blocking state [ 1513.880264] bridge0: port 1(bridge_slave_0) entered disabled state [ 1513.888338] device bridge_slave_0 entered promiscuous mode [ 1513.897089] bridge0: port 2(bridge_slave_1) entered blocking state [ 1513.904664] bridge0: port 2(bridge_slave_1) entered disabled state [ 1513.912881] device bridge_slave_1 entered promiscuous mode [ 1513.944613] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1513.955940] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1513.985645] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1513.994363] team0: Port device team_slave_0 added [ 1514.000816] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1514.009662] team0: Port device team_slave_1 added [ 1514.015837] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1514.024873] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1514.097696] device hsr_slave_0 entered promiscuous mode [ 1514.135134] device hsr_slave_1 entered promiscuous mode [ 1514.195122] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1514.202182] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1514.264078] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1514.368711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1514.383214] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1514.395554] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1514.402195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1514.411208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1514.426893] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1514.433100] 8021q: adding VLAN 0 to HW filter on device team0 [ 1514.441397] IPVS: ftp: loaded support on port[0] = 21 [ 1514.459780] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1514.467507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1514.477833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1514.487346] bridge0: port 1(bridge_slave_0) entered blocking state [ 1514.494099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1514.510374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1514.517809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1514.526212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1514.534332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1514.542300] bridge0: port 2(bridge_slave_1) entered blocking state [ 1514.549030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1514.568259] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1514.583038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1514.596120] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1514.620461] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1514.629748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1514.639826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1514.648082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1514.662392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1514.676752] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1514.684133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1514.692323] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1514.705106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1514.717131] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1514.729850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1514.738087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1514.746486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1514.754512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1514.764193] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1514.771135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1514.808569] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1514.822280] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1514.847566] chnl_net:caif_netlink_parms(): no params data found [ 1514.921438] bridge0: port 1(bridge_slave_0) entered blocking state [ 1514.928721] bridge0: port 1(bridge_slave_0) entered disabled state [ 1514.936568] device bridge_slave_0 entered promiscuous mode [ 1514.944068] bridge0: port 2(bridge_slave_1) entered blocking state [ 1514.950628] bridge0: port 2(bridge_slave_1) entered disabled state [ 1514.959737] device bridge_slave_1 entered promiscuous mode 03:48:58 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:48:58 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:48:58 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000002aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:48:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xef0}], 0x1}}], 0x2, 0x0, 0x0) 03:48:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000100)={0x0, 'teql0\x00', 0x1}, 0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r2, 0x0, 0x2}, 0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001840)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], &(0x7f00000000c0)=0x1008) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="00286eb4fa920000000000000000", 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r3, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1514.992078] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1515.008124] bond0: Enslaving bond_slave_1 as an active interface with an up link 03:48:58 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:48:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x5, 0x6, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x0, 0x2}, 0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f00000003c0)={r5, 0x6}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000440)={r6, @in6={{0xa, 0x4e21, 0x9, @empty, 0x8000}}}, 0x84) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1515.196330] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1515.267163] team0: Port device team_slave_0 added 03:48:59 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1515.299969] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready 03:48:59 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1515.358212] team0: Port device team_slave_1 added [ 1515.400887] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1515.420932] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 03:48:59 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1515.475182] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1515.498052] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1515.521636] CPU: 1 PID: 30811 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1515.528605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1515.538150] Call Trace: [ 1515.540760] dump_stack+0x172/0x1f0 [ 1515.544418] dump_header+0x15e/0xa55 [ 1515.548156] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1515.553286] ? ___ratelimit+0x60/0x595 [ 1515.557201] ? do_raw_spin_unlock+0x57/0x270 [ 1515.561645] oom_kill_process.cold+0x10/0x6ef [ 1515.566177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1515.571752] ? task_will_free_mem+0x139/0x6e0 [ 1515.576291] out_of_memory+0x936/0x12d0 [ 1515.580296] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1515.585348] ? oom_killer_disable+0x280/0x280 [ 1515.589885] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1515.594841] ? memcg_event_wake+0x230/0x230 [ 1515.599295] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1515.599313] ? cgroup_file_notify+0x140/0x1b0 [ 1515.599334] memory_max_write+0x169/0x300 [ 1515.599350] ? retint_kernel+0x2d/0x2d [ 1515.609045] ? mem_cgroup_write+0x360/0x360 [ 1515.609058] ? lock_acquire+0x16f/0x3f0 [ 1515.609076] ? kernfs_fop_write+0x227/0x480 [ 1515.621455] ? check_memory_region+0x112/0x190 [ 1515.621476] cgroup_file_write+0x241/0x790 [ 1515.621496] ? mem_cgroup_write+0x360/0x360 [ 1515.621508] ? kill_css+0x380/0x380 [ 1515.621528] ? kill_css+0x380/0x380 [ 1515.621544] kernfs_fop_write+0x2b8/0x480 [ 1515.621565] __vfs_write+0x114/0x810 [ 1515.621581] ? kernfs_fop_open+0xd80/0xd80 [ 1515.621596] ? kernel_read+0x120/0x120 [ 1515.621613] ? __lock_is_held+0xb6/0x140 [ 1515.621635] ? rcu_read_lock_sched_held+0x110/0x130 [ 1515.675513] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1515.680461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1515.686026] ? __sb_start_write+0x1a9/0x360 [ 1515.690364] vfs_write+0x20c/0x560 [ 1515.693912] ksys_write+0x14f/0x2d0 [ 1515.697727] ? __ia32_sys_read+0xb0/0xb0 [ 1515.701803] ? do_syscall_64+0x26/0x620 [ 1515.705967] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1515.711347] ? do_syscall_64+0x26/0x620 [ 1515.715340] __x64_sys_write+0x73/0xb0 [ 1515.719452] do_syscall_64+0xfd/0x620 [ 1515.723271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1515.728584] RIP: 0033:0x459a29 [ 1515.731783] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1515.751118] RSP: 002b:00007f4fc03d5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1515.758831] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1515.766285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1515.773798] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1515.781208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fc03d66d4 [ 1515.788502] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1515.822383] Task in /syz5 killed as a result of limit of /syz5 [ 1515.829326] memory: usage 7876kB, limit 0kB, failcnt 67 [ 1515.836797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1515.843784] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1515.850430] Memory cgroup stats for /syz5: cache:0KB rss:2216KB rss_huge:2048KB shmem:64KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2192KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1515.874734] Memory cgroup out of memory: Kill process 30810 (syz-executor.5) score 9276000 or sacrifice child [ 1515.885719] Killed process 30810 (syz-executor.5) total-vm:72580kB, anon-rss:2192kB, file-rss:35844kB, shmem-rss:0kB [ 1515.904844] oom_reaper: reaped process 30810 (syz-executor.5), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB [ 1515.933786] device hsr_slave_0 entered promiscuous mode [ 1515.971342] syz-executor.5 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=0 [ 1515.985100] device hsr_slave_1 entered promiscuous mode [ 1515.990927] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1515.996997] CPU: 1 PID: 30792 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1516.003947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1516.013317] Call Trace: [ 1516.015915] dump_stack+0x172/0x1f0 [ 1516.019591] dump_header+0x15e/0xa55 [ 1516.023406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1516.028631] ? ___ratelimit+0x60/0x595 [ 1516.032526] ? do_raw_spin_unlock+0x57/0x270 [ 1516.037066] oom_kill_process.cold+0x10/0x6ef [ 1516.041766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1516.047328] ? task_will_free_mem+0x139/0x6e0 [ 1516.051845] out_of_memory+0x936/0x12d0 [ 1516.055849] ? lock_downgrade+0x810/0x810 [ 1516.060025] ? oom_killer_disable+0x280/0x280 [ 1516.064677] ? find_held_lock+0x35/0x130 [ 1516.068762] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1516.073612] ? memcg_event_wake+0x230/0x230 [ 1516.077935] ? do_raw_spin_unlock+0x57/0x270 [ 1516.082344] ? _raw_spin_unlock+0x2d/0x50 [ 1516.086486] try_charge+0xef7/0x1480 [ 1516.090198] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1516.095208] ? rcu_read_lock_sched_held+0x110/0x130 [ 1516.100214] ? __alloc_pages_nodemask+0x632/0x750 [ 1516.105149] ? do_raw_spin_unlock+0x57/0x270 [ 1516.109671] memcg_kmem_charge_memcg+0x7c/0x130 [ 1516.114345] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1516.118920] ? cache_grow_begin+0x597/0x8c0 [ 1516.123233] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1516.127807] ? trace_hardirqs_on+0x67/0x220 [ 1516.132170] cache_grow_begin+0x3fa/0x8c0 [ 1516.136355] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1516.141884] ? __cpuset_node_allowed+0x136/0x540 [ 1516.146630] fallback_alloc+0x1fd/0x2d0 [ 1516.150599] ____cache_alloc_node+0x1be/0x1e0 [ 1516.155100] kmem_cache_alloc_node_trace+0xec/0x720 [ 1516.160110] ? lock_downgrade+0x810/0x810 [ 1516.164256] __kmalloc_node+0x3d/0x80 [ 1516.168193] kvmalloc_node+0x68/0x100 [ 1516.172334] xt_alloc_table_info+0x41/0xa0 [ 1516.176566] do_ip6t_set_ctl+0x25a/0x498 [ 1516.180619] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 1516.185460] ? mutex_unlock+0xd/0x10 [ 1516.189164] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1516.194589] nf_setsockopt+0x77/0xd0 [ 1516.198429] ipv6_setsockopt+0x13e/0x170 [ 1516.202754] tcp_setsockopt+0x8f/0xe0 [ 1516.206562] sock_common_setsockopt+0x94/0xd0 [ 1516.211052] __sys_setsockopt+0x17a/0x280 [ 1516.215189] ? kernel_accept+0x310/0x310 [ 1516.219243] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1516.223990] ? do_syscall_64+0x26/0x620 [ 1516.227955] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1516.233309] ? do_syscall_64+0x26/0x620 [ 1516.237280] __x64_sys_setsockopt+0xbe/0x150 [ 1516.241681] do_syscall_64+0xfd/0x620 [ 1516.245570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1516.250752] RIP: 0033:0x45c55a [ 1516.253942] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1516.272836] RSP: 002b:00007ffeea95abc8 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1516.280540] RAX: ffffffffffffffda RBX: 00007ffeea95abf0 RCX: 000000000045c55a [ 1516.287817] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1516.295076] RBP: 0000000000712cc0 R08: 00000000000003b8 R09: 0000000000004000 [ 1516.302336] R10: 0000000000712660 R11: 0000000000000202 R12: 0000000000000003 [ 1516.309685] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000712600 [ 1516.319791] Task in /syz5 killed as a result of limit of /syz5 [ 1516.325983] memory: usage 5528kB, limit 0kB, failcnt 79 [ 1516.331470] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1516.339116] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1516.346226] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1516.353299] Memory cgroup stats for /syz5: cache:0KB rss:104KB rss_huge:0KB shmem:64KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1516.368085] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1516.393843] Memory cgroup out of memory: Kill process 30792 (syz-executor.5) score 9002000 or sacrifice child [ 1516.410030] Killed process 30792 (syz-executor.5) total-vm:72448kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 1516.467420] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1516.505812] device bridge_slave_1 left promiscuous mode [ 1516.511470] bridge0: port 2(bridge_slave_1) entered disabled state [ 1516.555723] device bridge_slave_0 left promiscuous mode [ 1516.561230] bridge0: port 1(bridge_slave_0) entered disabled state [ 1516.726557] device hsr_slave_1 left promiscuous mode [ 1516.769664] device hsr_slave_0 left promiscuous mode [ 1516.829023] team0 (unregistering): Port device team_slave_1 removed [ 1516.842195] team0 (unregistering): Port device team_slave_0 removed [ 1516.853316] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1516.889579] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1516.970362] bond0 (unregistering): Released all slaves [ 1517.029769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1517.039054] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1517.048847] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1517.056180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1517.063300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1517.072885] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1517.079468] 8021q: adding VLAN 0 to HW filter on device team0 [ 1517.088724] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1517.097301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1517.106188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1517.113991] bridge0: port 1(bridge_slave_0) entered blocking state [ 1517.120446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1517.136922] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1517.147024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1517.154940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1517.162907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1517.170833] bridge0: port 2(bridge_slave_1) entered blocking state [ 1517.177290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1517.188066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1517.196179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1517.267081] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1517.274682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1517.294129] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1517.304411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1517.321117] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1517.332181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1517.340342] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1517.348869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1517.358162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1517.370403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1517.378582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1517.388010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1517.400944] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1517.408763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1517.424159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1517.435575] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1517.441652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1517.467921] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1517.485909] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1517.843781] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1517.857392] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1517.863639] CPU: 0 PID: 30841 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1517.870581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1517.880092] Call Trace: [ 1517.882706] dump_stack+0x172/0x1f0 [ 1517.886351] dump_header+0x15e/0xa55 [ 1517.890074] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1517.895196] ? ___ratelimit+0x60/0x595 [ 1517.899092] ? do_raw_spin_unlock+0x57/0x270 [ 1517.903535] oom_kill_process.cold+0x10/0x6ef [ 1517.908046] ? mem_cgroup_get_max+0xa8/0x240 [ 1517.912467] out_of_memory+0x936/0x12d0 [ 1517.916458] ? oom_killer_disable+0x280/0x280 [ 1517.920980] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1517.925852] ? memcg_event_wake+0x230/0x230 [ 1517.930185] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1517.935310] ? cgroup_file_notify+0x140/0x1b0 [ 1517.939971] memory_max_write+0x169/0x300 [ 1517.944140] ? mem_cgroup_write+0x360/0x360 [ 1517.948497] ? lock_acquire+0x16f/0x3f0 [ 1517.952479] ? kernfs_fop_write+0x227/0x480 [ 1517.956821] cgroup_file_write+0x241/0x790 [ 1517.961064] ? mem_cgroup_write+0x360/0x360 [ 1517.965387] ? kill_css+0x380/0x380 [ 1517.969024] ? kill_css+0x380/0x380 [ 1517.972658] kernfs_fop_write+0x2b8/0x480 [ 1517.976818] __vfs_write+0x114/0x810 [ 1517.980534] ? kernfs_fop_open+0xd80/0xd80 [ 1517.984771] ? kernel_read+0x120/0x120 [ 1517.988667] ? __lock_is_held+0xb6/0x140 [ 1517.992764] ? rcu_read_lock_sched_held+0x110/0x130 [ 1517.997797] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1518.002588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1518.008231] ? __sb_start_write+0x1a9/0x360 [ 1518.012656] vfs_write+0x20c/0x560 [ 1518.016214] ksys_write+0x14f/0x2d0 [ 1518.019860] ? __ia32_sys_read+0xb0/0xb0 [ 1518.023934] ? do_syscall_64+0x26/0x620 [ 1518.027920] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.033293] ? do_syscall_64+0x26/0x620 [ 1518.037293] __x64_sys_write+0x73/0xb0 [ 1518.041218] do_syscall_64+0xfd/0x620 [ 1518.045038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.050244] RIP: 0033:0x459a29 [ 1518.053452] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1518.073494] RSP: 002b:00007f0f59c2ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1518.081566] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1518.088897] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1518.096197] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1518.103479] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0f59c2f6d4 [ 1518.110841] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1518.128490] Task in /syz2 killed as a result of limit of /syz2 [ 1518.139845] memory: usage 3276kB, limit 0kB, failcnt 271916 [ 1518.148584] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1518.161171] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1518.171149] Memory cgroup stats for /syz2: cache:156KB rss:2156KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2176KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1518.205406] Memory cgroup out of memory: Kill process 30840 (syz-executor.2) score 9275000 or sacrifice child [ 1518.222533] Killed process 30840 (syz-executor.2) total-vm:72716kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB [ 1518.249567] oom_reaper: reaped process 30840 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 03:49:02 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:02 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:02 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000006aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:49:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xef8}], 0x1}}], 0x2, 0x0, 0x0) 03:49:02 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x227a, 0x0) r2 = fcntl$getown(r1, 0x9) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)=r2) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000240)="32665eefe42538eab97380975fe3f605237af89eddf38afb3a0f53aba159d45d99b4d7539cebfcbdc2c8a989d76134ccdb0e2506a2b489278a466f0d81d250fe3c0db3fe0bc953ccd54d7fec5384d39f37faf95812c5ee844d04bd4072ff19cf0f3c38ad1308b784cc789e8f5584f9f89337f02cbb7a4f960923b85cc7b4421373d267c49bcbc650fe9130d25c23be56a681ad69ad819741665f1491", 0x9c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r5 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x8000, 0x55b9dff8e8e72ad4) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000200)={r4, 0x5, 0x9, r5}) r6 = accept$alg(r0, 0x0, 0x0) write(r6, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r6, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$bt_BT_RCVMTU(r7, 0x112, 0xd, &(0x7f0000000100)=0x9, &(0x7f0000000140)=0x2) [ 1518.501825] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1518.557214] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1518.562750] CPU: 1 PID: 30795 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1518.570295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.579838] Call Trace: [ 1518.582534] dump_stack+0x172/0x1f0 [ 1518.587057] dump_header+0x15e/0xa55 [ 1518.590970] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1518.596097] ? ___ratelimit+0x60/0x595 [ 1518.600000] ? do_raw_spin_unlock+0x57/0x270 [ 1518.604430] oom_kill_process.cold+0x10/0x6ef [ 1518.608948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1518.614507] ? task_will_free_mem+0x139/0x6e0 [ 1518.619030] out_of_memory+0x936/0x12d0 [ 1518.623028] ? lock_downgrade+0x810/0x810 [ 1518.627200] ? oom_killer_disable+0x280/0x280 [ 1518.631748] ? find_held_lock+0x35/0x130 [ 1518.636364] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1518.641236] ? memcg_event_wake+0x230/0x230 [ 1518.645761] ? do_raw_spin_unlock+0x57/0x270 [ 1518.650200] ? _raw_spin_unlock+0x2d/0x50 [ 1518.654472] try_charge+0xef7/0x1480 [ 1518.658259] ? find_held_lock+0x35/0x130 [ 1518.662346] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1518.667226] ? kasan_check_read+0x11/0x20 [ 1518.671434] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1518.676306] mem_cgroup_try_charge+0x259/0x6b0 [ 1518.681009] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1518.685964] wp_page_copy+0x430/0x16a0 [ 1518.689885] ? pmd_pfn+0x1d0/0x1d0 [ 1518.693449] ? kasan_check_read+0x11/0x20 [ 1518.697618] ? do_raw_spin_unlock+0x57/0x270 [ 1518.702051] do_wp_page+0x57d/0x10b0 [ 1518.705791] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1518.710489] ? kasan_check_write+0x14/0x20 [ 1518.714774] ? do_raw_spin_lock+0xc8/0x240 [ 1518.719642] __handle_mm_fault+0x2305/0x3f80 [ 1518.724080] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1518.729057] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1518.733761] handle_mm_fault+0x1b5/0x690 [ 1518.737860] __do_page_fault+0x62a/0xe90 [ 1518.741947] ? ksys_write+0x1f1/0x2d0 [ 1518.745964] ? vmalloc_fault+0x740/0x740 [ 1518.750140] ? trace_hardirqs_off_caller+0x65/0x220 [ 1518.755536] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1518.761055] ? page_fault+0x8/0x30 [ 1518.764706] do_page_fault+0x71/0x57d [ 1518.769053] ? page_fault+0x8/0x30 [ 1518.774364] page_fault+0x1e/0x30 [ 1518.777929] RIP: 0033:0x4034f2 [ 1518.781138] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 1518.800500] RSP: 002b:00007ffd61563d90 EFLAGS: 00010246 03:49:02 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1518.805980] RAX: 0000000000000000 RBX: 00000000001728ad RCX: 0000000000413630 [ 1518.813266] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffd61564ec0 [ 1518.820553] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555c75940 [ 1518.827836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd61564ec0 [ 1518.835222] R13: 00007ffd61564eb0 R14: 0000000000000000 R15: 00007ffd61564ec0 03:49:02 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1518.859457] Task in /syz2 killed as a result of limit of /syz2 [ 1518.871836] memory: usage 892kB, limit 0kB, failcnt 271924 [ 1518.932886] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1518.968669] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:49:02 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:02 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1518.991235] Memory cgroup stats for /syz2: cache:156KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1519.077918] Memory cgroup out of memory: Kill process 30795 (syz-executor.2) score 8760000 or sacrifice child 03:49:02 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:02 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1519.189924] Killed process 30795 (syz-executor.2) total-vm:72452kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB [ 1519.209921] oom_reaper: reaped process 30795 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 03:49:03 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:03 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x84000, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x61) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:49:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf00}], 0x1}}], 0x2, 0x0, 0x0) [ 1519.825638] device bridge_slave_1 left promiscuous mode [ 1519.831131] bridge0: port 2(bridge_slave_1) entered disabled state [ 1519.875258] device bridge_slave_0 left promiscuous mode [ 1519.880802] bridge0: port 1(bridge_slave_0) entered disabled state [ 1520.011842] device hsr_slave_1 left promiscuous mode [ 1520.058341] device hsr_slave_0 left promiscuous mode [ 1520.109737] team0 (unregistering): Port device team_slave_1 removed [ 1520.122467] team0 (unregistering): Port device team_slave_0 removed [ 1520.134590] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1520.179006] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1520.268815] bond0 (unregistering): Released all slaves [ 1520.892933] IPVS: ftp: loaded support on port[0] = 21 [ 1521.030948] chnl_net:caif_netlink_parms(): no params data found [ 1521.119449] bridge0: port 1(bridge_slave_0) entered blocking state [ 1521.132171] bridge0: port 1(bridge_slave_0) entered disabled state [ 1521.141591] device bridge_slave_0 entered promiscuous mode [ 1521.156224] bridge0: port 2(bridge_slave_1) entered blocking state [ 1521.162830] bridge0: port 2(bridge_slave_1) entered disabled state [ 1521.187517] device bridge_slave_1 entered promiscuous mode [ 1521.230362] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1521.248882] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1521.268429] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1521.276426] team0: Port device team_slave_0 added [ 1521.283604] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1521.291775] team0: Port device team_slave_1 added [ 1521.297509] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1521.308874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1521.388325] device hsr_slave_0 entered promiscuous mode [ 1521.434715] device hsr_slave_1 entered promiscuous mode [ 1521.476695] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1521.483850] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1521.503813] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1521.541480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1521.551898] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1521.561658] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1521.569436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1521.577909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1521.587866] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1521.594065] 8021q: adding VLAN 0 to HW filter on device team0 [ 1521.610101] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1521.618393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1521.633476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1521.641660] bridge0: port 1(bridge_slave_0) entered blocking state [ 1521.648124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1521.664346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1521.675717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1521.682922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1521.690615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1521.698850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1521.707078] bridge0: port 2(bridge_slave_1) entered blocking state [ 1521.713440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1521.720991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1521.731941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1521.739394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1521.751298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1521.758766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1521.768413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1521.786477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1521.798563] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1521.808644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1521.821087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1521.834879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1521.846035] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1521.853437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1521.861835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1521.869648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1521.877981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1521.887926] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1521.894051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1521.911027] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1521.922623] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1522.035988] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1522.054005] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1522.059872] CPU: 1 PID: 30894 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1522.066811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.076184] Call Trace: [ 1522.078769] dump_stack+0x172/0x1f0 [ 1522.082419] dump_header+0x15e/0xa55 [ 1522.086136] oom_kill_process.cold+0x10/0x6ef [ 1522.090631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1522.096421] ? task_will_free_mem+0x139/0x6e0 [ 1522.100919] out_of_memory+0x936/0x12d0 [ 1522.104904] ? oom_killer_disable+0x280/0x280 [ 1522.109427] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1522.114285] ? memcg_event_wake+0x230/0x230 [ 1522.118613] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1522.123725] ? cgroup_file_notify+0x140/0x1b0 [ 1522.128228] memory_max_write+0x169/0x300 [ 1522.132468] ? mem_cgroup_write+0x360/0x360 [ 1522.136779] ? cgroup_file_write+0x220/0x790 [ 1522.141178] cgroup_file_write+0x241/0x790 [ 1522.145419] ? mem_cgroup_write+0x360/0x360 [ 1522.149749] ? kill_css+0x380/0x380 [ 1522.153521] ? kill_css+0x380/0x380 [ 1522.157146] kernfs_fop_write+0x2b8/0x480 [ 1522.161308] __vfs_write+0x114/0x810 [ 1522.165027] ? kernfs_fop_open+0xd80/0xd80 [ 1522.169280] ? kernel_read+0x120/0x120 [ 1522.173165] ? __lock_is_held+0xb6/0x140 [ 1522.177311] ? rcu_read_lock_sched_held+0x110/0x130 [ 1522.182322] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1522.187094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1522.192634] ? __sb_start_write+0x1a9/0x360 [ 1522.196968] vfs_write+0x20c/0x560 [ 1522.200524] ksys_write+0x14f/0x2d0 [ 1522.204315] ? __ia32_sys_read+0xb0/0xb0 [ 1522.208389] ? do_syscall_64+0x26/0x620 [ 1522.212365] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1522.217846] ? do_syscall_64+0x26/0x620 [ 1522.221820] __x64_sys_write+0x73/0xb0 [ 1522.225824] do_syscall_64+0xfd/0x620 [ 1522.229633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1522.234821] RIP: 0033:0x459a29 [ 1522.238001] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1522.257069] RSP: 002b:00007fe12a07dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1522.264768] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1522.272037] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1522.279304] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1522.286585] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe12a07e6d4 [ 1522.293856] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1522.327833] Task in /syz5 killed as a result of limit of /syz5 [ 1522.334169] memory: usage 7260kB, limit 0kB, failcnt 80 [ 1522.343048] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1522.353902] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1522.360489] Memory cgroup stats for /syz5: cache:0KB rss:2152KB rss_huge:2048KB shmem:64KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1522.382257] Memory cgroup out of memory: Kill process 30893 (syz-executor.5) score 9273000 or sacrifice child [ 1522.393126] Killed process 30893 (syz-executor.5) total-vm:72584kB, anon-rss:2184kB, file-rss:35844kB, shmem-rss:0kB [ 1522.407011] oom_reaper: reaped process 30893 (syz-executor.5), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB 03:49:06 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:06 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:06 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:06 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:public_content_rw_t:s0\x00', 0x29, 0x5) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r2 = request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='kw(serpent)\x00', 0xfffffffffffffffb) keyctl$link(0x8, r2, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:49:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf08}], 0x1}}], 0x2, 0x0, 0x0) [ 1522.602120] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1522.627046] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1522.634466] CPU: 0 PID: 30890 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1522.641436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.650917] Call Trace: [ 1522.653506] dump_stack+0x172/0x1f0 [ 1522.657154] dump_header+0x15e/0xa55 [ 1522.660890] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1522.665991] ? ___ratelimit+0x60/0x595 [ 1522.669875] ? do_raw_spin_unlock+0x57/0x270 [ 1522.674391] oom_kill_process.cold+0x10/0x6ef [ 1522.678902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1522.684439] ? task_will_free_mem+0x139/0x6e0 [ 1522.688930] out_of_memory+0x936/0x12d0 [ 1522.692893] ? lock_downgrade+0x810/0x810 [ 1522.697046] ? oom_killer_disable+0x280/0x280 [ 1522.701541] ? find_held_lock+0x35/0x130 [ 1522.705607] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1522.710441] ? memcg_event_wake+0x230/0x230 [ 1522.714770] ? do_raw_spin_unlock+0x57/0x270 [ 1522.719180] ? _raw_spin_unlock+0x2d/0x50 [ 1522.723324] try_charge+0xef7/0x1480 [ 1522.727031] ? find_held_lock+0x35/0x130 [ 1522.731346] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1522.736201] ? kasan_check_read+0x11/0x20 [ 1522.740362] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1522.745214] mem_cgroup_try_charge+0x259/0x6b0 [ 1522.749803] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1522.754749] __handle_mm_fault+0x1e50/0x3f80 [ 1522.759166] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1522.764143] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1522.768809] handle_mm_fault+0x1b5/0x690 [ 1522.772867] __do_page_fault+0x62a/0xe90 [ 1522.776931] ? ksys_write+0x1f1/0x2d0 [ 1522.780832] ? vmalloc_fault+0x740/0x740 [ 1522.784887] ? trace_hardirqs_off_caller+0x65/0x220 [ 1522.790235] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1522.795171] ? page_fault+0x8/0x30 [ 1522.798718] do_page_fault+0x71/0x57d [ 1522.802510] ? page_fault+0x8/0x30 [ 1522.806075] page_fault+0x1e/0x30 [ 1522.811171] RIP: 0033:0x4034f2 [ 1522.814370] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 1522.833476] RSP: 002b:00007fff3e43af30 EFLAGS: 00010246 [ 1522.838859] RAX: 0000000000000000 RBX: 0000000000173945 RCX: 0000000000413630 [ 1522.846232] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff3e43c060 [ 1522.853736] RBP: 0000000000000002 R08: 0000000000000001 R09: 000055555606f940 [ 1522.861005] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff3e43c060 [ 1522.868764] R13: 00007fff3e43c050 R14: 0000000000000000 R15: 00007fff3e43c060 [ 1522.886492] Task in /syz5 killed as a result of limit of /syz5 [ 1522.908410] memory: usage 4932kB, limit 0kB, failcnt 88 03:49:06 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1522.931351] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1522.980923] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1523.010593] Memory cgroup stats for /syz5: cache:0KB rss:44KB rss_huge:0KB shmem:64KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:44KB inactive_file:0KB active_file:0KB unevictable:0KB 03:49:06 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400", 0x2a}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1523.083973] Memory cgroup out of memory: Kill process 30890 (syz-executor.5) score 8758000 or sacrifice child [ 1523.096268] Killed process 30890 (syz-executor.5) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 1523.109388] oom_reaper: reaped process 30890 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1523.155539] device bridge_slave_1 left promiscuous mode [ 1523.161089] bridge0: port 2(bridge_slave_1) entered disabled state 03:49:06 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1523.207905] device bridge_slave_0 left promiscuous mode [ 1523.217400] bridge0: port 1(bridge_slave_0) entered disabled state 03:49:07 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400", 0x2a}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:07 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:07 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1523.520160] device hsr_slave_1 left promiscuous mode [ 1523.570933] device hsr_slave_0 left promiscuous mode [ 1523.631094] team0 (unregistering): Port device team_slave_1 removed [ 1523.663136] team0 (unregistering): Port device team_slave_0 removed [ 1523.701685] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1523.786365] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1523.959145] bond0 (unregistering): Released all slaves 03:49:07 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000030aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:49:07 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x50000, 0x21) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f00000002c0)={0x2, 0x1, 0x5, 0x0, 0x7, 0x1}) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='.et/udt\x01') r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="2c23e5e533c1", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) ioctl$TIOCNOTTY(r3, 0x5422) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x0, 0x2}, 0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180)={r5, 0x20, 0x2}, 0x10) preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xc003, &(0x7f0000000200)=0x4, 0x1, 0x6) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r7, 0x0, 0x2}, 0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={r7, 0x3c, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x1ff, @empty, 0x1}, @in={0x2, 0x4e22, @empty}]}, &(0x7f0000000140)=0x10) [ 1525.110196] IPVS: ftp: loaded support on port[0] = 21 [ 1525.219397] chnl_net:caif_netlink_parms(): no params data found [ 1525.254403] bridge0: port 1(bridge_slave_0) entered blocking state [ 1525.260974] bridge0: port 1(bridge_slave_0) entered disabled state [ 1525.268605] device bridge_slave_0 entered promiscuous mode [ 1525.276042] bridge0: port 2(bridge_slave_1) entered blocking state [ 1525.282606] bridge0: port 2(bridge_slave_1) entered disabled state [ 1525.290228] device bridge_slave_1 entered promiscuous mode [ 1525.308666] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1525.326908] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1525.345563] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1525.353167] team0: Port device team_slave_0 added [ 1525.359504] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1525.367145] team0: Port device team_slave_1 added [ 1525.372973] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1525.385328] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1525.417043] device hsr_slave_0 entered promiscuous mode [ 1525.464588] device hsr_slave_1 entered promiscuous mode [ 1525.504903] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1525.520242] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1525.535528] bridge0: port 2(bridge_slave_1) entered blocking state [ 1525.541918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1525.548598] bridge0: port 1(bridge_slave_0) entered blocking state [ 1525.555027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1525.599215] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1525.606699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1525.621456] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1525.630961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1525.639284] bridge0: port 1(bridge_slave_0) entered disabled state [ 1525.646331] bridge0: port 2(bridge_slave_1) entered disabled state [ 1525.653644] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1525.664163] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1525.671208] 8021q: adding VLAN 0 to HW filter on device team0 [ 1525.685811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1525.693705] bridge0: port 1(bridge_slave_0) entered blocking state [ 1525.700219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1525.711426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1525.720070] bridge0: port 2(bridge_slave_1) entered blocking state [ 1525.726501] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1525.748330] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1525.757299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1525.767992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1525.790658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1525.799390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1525.809351] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1525.816406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1525.831550] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1525.850091] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1525.886251] device bridge_slave_1 left promiscuous mode [ 1525.892032] bridge0: port 2(bridge_slave_1) entered disabled state [ 1525.943600] device bridge_slave_0 left promiscuous mode [ 1525.949917] bridge0: port 1(bridge_slave_0) entered disabled state [ 1525.989490] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1526.002333] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1526.008855] CPU: 1 PID: 30940 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1526.015808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.025343] Call Trace: [ 1526.027964] dump_stack+0x172/0x1f0 [ 1526.031619] dump_header+0x15e/0xa55 [ 1526.035349] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1526.040515] ? ___ratelimit+0x60/0x595 [ 1526.044465] ? do_raw_spin_unlock+0x57/0x270 [ 1526.049146] oom_kill_process.cold+0x10/0x6ef [ 1526.053661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.059219] ? task_will_free_mem+0x139/0x6e0 [ 1526.063751] out_of_memory+0x936/0x12d0 [ 1526.067745] ? oom_killer_disable+0x280/0x280 [ 1526.072259] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1526.077120] ? memcg_event_wake+0x230/0x230 [ 1526.081584] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1526.086700] ? cgroup_file_notify+0x140/0x1b0 [ 1526.091225] memory_max_write+0x169/0x300 [ 1526.095388] ? mem_cgroup_write+0x360/0x360 [ 1526.099739] cgroup_file_write+0x241/0x790 [ 1526.103999] ? mem_cgroup_write+0x360/0x360 [ 1526.108339] ? kill_css+0x380/0x380 [ 1526.112002] ? kill_css+0x380/0x380 [ 1526.115650] kernfs_fop_write+0x2b8/0x480 [ 1526.119833] __vfs_write+0x114/0x810 [ 1526.123571] ? kernfs_fop_open+0xd80/0xd80 [ 1526.127824] ? kernel_read+0x120/0x120 [ 1526.131836] ? __lock_is_held+0xb6/0x140 [ 1526.135937] ? rcu_read_lock_sched_held+0x110/0x130 [ 1526.140994] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1526.146012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.151568] ? __sb_start_write+0x1a9/0x360 [ 1526.155904] vfs_write+0x20c/0x560 [ 1526.159461] ksys_write+0x14f/0x2d0 [ 1526.163106] ? __ia32_sys_read+0xb0/0xb0 [ 1526.167189] __x64_sys_write+0x73/0xb0 [ 1526.171186] ? do_syscall_64+0x5b/0x620 [ 1526.175213] do_syscall_64+0xfd/0x620 [ 1526.179029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1526.184231] RIP: 0033:0x459a29 [ 1526.187616] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1526.206758] RSP: 002b:00007f67fa5d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1526.214478] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1526.222180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1526.229457] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1526.236879] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f67fa5d36d4 [ 1526.244139] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1526.272248] Task in /syz2 killed as a result of limit of /syz2 [ 1526.280147] memory: usage 3196kB, limit 0kB, failcnt 271925 [ 1526.286461] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1526.299075] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1526.306192] Memory cgroup stats for /syz2: cache:156KB rss:2196KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2164KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1526.329459] Memory cgroup out of memory: Kill process 30939 (syz-executor.2) score 9274000 or sacrifice child [ 1526.341238] Killed process 30939 (syz-executor.2) total-vm:72584kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 1526.359712] oom_reaper: reaped process 30939 (syz-executor.2), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 03:49:10 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe800000000000000000000000003faa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:49:10 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400", 0x2a}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf10}], 0x1}}], 0x2, 0x0, 0x0) 03:49:10 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1526.427226] device hsr_slave_1 left promiscuous mode [ 1526.446622] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1526.459057] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1526.470164] CPU: 0 PID: 30936 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1526.477312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.477317] Call Trace: [ 1526.477337] dump_stack+0x172/0x1f0 [ 1526.477356] dump_header+0x15e/0xa55 [ 1526.497271] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1526.497287] ? ___ratelimit+0x60/0x595 [ 1526.497300] ? do_raw_spin_unlock+0x57/0x270 [ 1526.497321] oom_kill_process.cold+0x10/0x6ef [ 1526.497341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.497353] ? task_will_free_mem+0x139/0x6e0 [ 1526.497369] out_of_memory+0x936/0x12d0 [ 1526.497382] ? lock_downgrade+0x810/0x810 [ 1526.497399] ? oom_killer_disable+0x280/0x280 [ 1526.497411] ? find_held_lock+0x35/0x130 [ 1526.497433] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1526.497447] ? memcg_event_wake+0x230/0x230 [ 1526.497461] ? do_raw_spin_unlock+0x57/0x270 [ 1526.497473] ? _raw_spin_unlock+0x2d/0x50 [ 1526.497485] try_charge+0xef7/0x1480 [ 1526.497498] ? find_held_lock+0x35/0x130 [ 1526.497514] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1526.497533] ? kasan_check_read+0x11/0x20 [ 1526.497553] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1526.497569] mem_cgroup_try_charge+0x259/0x6b0 [ 1526.497589] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1526.497606] wp_page_copy+0x430/0x16a0 [ 1526.497625] ? pmd_pfn+0x1d0/0x1d0 [ 1526.497639] ? kasan_check_read+0x11/0x20 [ 1526.497652] ? do_raw_spin_unlock+0x57/0x270 [ 1526.497669] do_wp_page+0x57d/0x10b0 [ 1526.497685] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1526.497700] ? kasan_check_write+0x14/0x20 [ 1526.497712] ? do_raw_spin_lock+0xc8/0x240 [ 1526.497728] __handle_mm_fault+0x2305/0x3f80 [ 1526.497744] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1526.497772] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1526.497788] handle_mm_fault+0x1b5/0x690 [ 1526.497807] __do_page_fault+0x62a/0xe90 [ 1526.497819] ? ksys_write+0x1f1/0x2d0 [ 1526.497838] ? vmalloc_fault+0x740/0x740 [ 1526.497854] ? trace_hardirqs_off_caller+0x65/0x220 [ 1526.497867] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1526.497878] ? page_fault+0x8/0x30 03:49:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1526.497894] do_page_fault+0x71/0x57d [ 1526.497906] ? page_fault+0x8/0x30 [ 1526.497918] page_fault+0x1e/0x30 [ 1526.497996] RIP: 0033:0x4034f2 [ 1526.498012] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 1526.498019] RSP: 002b:00007fff3e036b80 EFLAGS: 00010246 [ 1526.498031] RAX: 0000000000000000 RBX: 00000000001748b0 RCX: 0000000000413630 [ 1526.498039] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff3e037cb0 [ 1526.498153] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555bf5940 [ 1526.498165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff3e037cb0 [ 1526.512275] R13: 00007fff3e037ca0 R14: 0000000000000000 R15: 00007fff3e037cb0 [ 1526.515012] Task in 03:49:10 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd", 0x3f}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1526.663696] /syz2 [ 1526.935184] killed as a result of limit of /syz2 [ 1526.940389] device hsr_slave_0 left promiscuous mode [ 1526.946026] memory: usage 864kB, limit 0kB, failcnt 271933 [ 1526.958516] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1526.969310] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:49:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:10 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd", 0x3f}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1526.975934] Memory cgroup stats for /syz2: cache:156KB rss:88KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1527.011732] team0 (unregistering): Port device team_slave_1 removed [ 1527.024570] Memory cgroup out of memory: Kill process 30936 (syz-executor.2) score 8759000 or sacrifice child [ 1527.058367] Killed process 30936 (syz-executor.2) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 1527.078467] team0 (unregistering): Port device team_slave_0 removed [ 1527.098186] oom_reaper: reaped process 30936 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 03:49:10 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1527.145223] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1527.259616] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1527.491898] bond0 (unregistering): Released all slaves 03:49:11 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:11 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd", 0x3f}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:11 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf18}], 0x1}}], 0x2, 0x0, 0x0) [ 1528.762161] IPVS: ftp: loaded support on port[0] = 21 [ 1528.831761] chnl_net:caif_netlink_parms(): no params data found [ 1528.876249] bridge0: port 1(bridge_slave_0) entered blocking state [ 1528.882677] bridge0: port 1(bridge_slave_0) entered disabled state [ 1528.890364] device bridge_slave_0 entered promiscuous mode [ 1528.901099] bridge0: port 2(bridge_slave_1) entered blocking state [ 1528.907659] bridge0: port 2(bridge_slave_1) entered disabled state [ 1528.915273] device bridge_slave_1 entered promiscuous mode [ 1528.934977] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1528.948993] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1528.970070] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1528.977974] team0: Port device team_slave_0 added [ 1528.984868] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1528.992392] team0: Port device team_slave_1 added [ 1529.002830] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1529.011064] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1529.057484] device hsr_slave_0 entered promiscuous mode [ 1529.094799] device hsr_slave_1 entered promiscuous mode [ 1529.135035] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1529.142247] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1529.163692] bridge0: port 2(bridge_slave_1) entered blocking state [ 1529.170171] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1529.176905] bridge0: port 1(bridge_slave_0) entered blocking state [ 1529.183412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1529.230034] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1529.239549] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1529.250909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1529.258727] bridge0: port 1(bridge_slave_0) entered disabled state [ 1529.266137] bridge0: port 2(bridge_slave_1) entered disabled state [ 1529.284940] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1529.291186] 8021q: adding VLAN 0 to HW filter on device team0 [ 1529.301473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1529.310242] bridge0: port 1(bridge_slave_0) entered blocking state [ 1529.316688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1529.332924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1529.341284] bridge0: port 2(bridge_slave_1) entered blocking state [ 1529.347913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1529.365362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1529.373343] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1529.398418] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1529.409265] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1529.419951] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1529.428021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1529.436668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1529.444948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1529.452656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1529.460799] device bridge_slave_1 left promiscuous mode [ 1529.468152] bridge0: port 2(bridge_slave_1) entered disabled state [ 1529.505285] device bridge_slave_0 left promiscuous mode [ 1529.510952] bridge0: port 1(bridge_slave_0) entered disabled state [ 1529.657577] device hsr_slave_1 left promiscuous mode [ 1529.728624] device hsr_slave_0 left promiscuous mode [ 1529.779566] team0 (unregistering): Port device team_slave_1 removed [ 1529.792164] team0 (unregistering): Port device team_slave_0 removed [ 1529.803897] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1529.859801] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1529.952358] bond0 (unregistering): Released all slaves [ 1530.004016] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1530.017189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1530.178375] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1530.196045] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1530.202691] CPU: 0 PID: 30987 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1530.209656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.219019] Call Trace: [ 1530.221620] dump_stack+0x172/0x1f0 [ 1530.225436] dump_header+0x15e/0xa55 [ 1530.229168] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1530.234274] ? ___ratelimit+0x60/0x595 [ 1530.238166] ? do_raw_spin_unlock+0x57/0x270 [ 1530.242585] oom_kill_process.cold+0x10/0x6ef [ 1530.247103] out_of_memory+0x936/0x12d0 [ 1530.251100] ? oom_killer_disable+0x280/0x280 [ 1530.255624] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1530.260475] ? memcg_event_wake+0x230/0x230 [ 1530.264818] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1530.269927] ? cgroup_file_notify+0x140/0x1b0 [ 1530.274437] memory_max_write+0x169/0x300 [ 1530.278597] ? mem_cgroup_write+0x360/0x360 [ 1530.282942] cgroup_file_write+0x241/0x790 [ 1530.287183] ? mem_cgroup_write+0x360/0x360 [ 1530.291531] ? kill_css+0x380/0x380 [ 1530.295185] ? kill_css+0x380/0x380 [ 1530.298826] kernfs_fop_write+0x2b8/0x480 [ 1530.303038] __vfs_write+0x114/0x810 [ 1530.306765] ? kernfs_fop_open+0xd80/0xd80 [ 1530.311009] ? kernel_read+0x120/0x120 [ 1530.314909] ? __lock_is_held+0xb6/0x140 [ 1530.318990] ? rcu_read_lock_sched_held+0x110/0x130 [ 1530.324015] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1530.328774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1530.334325] ? __sb_start_write+0x1a9/0x360 [ 1530.338697] vfs_write+0x20c/0x560 [ 1530.342257] ksys_write+0x14f/0x2d0 [ 1530.345895] ? __ia32_sys_read+0xb0/0xb0 [ 1530.349972] ? do_syscall_64+0x26/0x620 [ 1530.353950] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1530.359317] ? do_syscall_64+0x26/0x620 [ 1530.363304] __x64_sys_write+0x73/0xb0 [ 1530.367211] do_syscall_64+0xfd/0x620 [ 1530.371033] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1530.376234] RIP: 0033:0x459a29 [ 1530.379454] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1530.398364] RSP: 002b:00007f5d0c3d0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1530.406089] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1530.413460] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1530.420734] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1530.428008] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d0c3d16d4 [ 1530.435980] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1530.454104] Task in /syz5 killed as a result of limit of /syz5 [ 1530.461160] memory: usage 6536kB, limit 0kB, failcnt 89 [ 1530.472456] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1530.480499] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1530.493018] Memory cgroup stats for /syz5: cache:0KB rss:2176KB rss_huge:2048KB shmem:64KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1530.521913] Memory cgroup out of memory: Kill process 30986 (syz-executor.5) score 9274000 or sacrifice child [ 1530.534831] Killed process 30986 (syz-executor.5) total-vm:72584kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 1530.554591] oom_reaper: reaped process 30986 (syz-executor.5), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB 03:49:14 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd", 0x3f}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xc710, 0x40000) tee(r1, r0, 0x4, 0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40080, 0x201) r2 = accept$alg(r0, 0x0, 0x0) write(r2, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffff7fff, 0x101}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:49:14 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:14 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:14 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf20}], 0x1}}], 0x2, 0x0, 0x0) [ 1530.880133] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1530.924477] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1530.930410] CPU: 1 PID: 30983 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 1530.937357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.946738] Call Trace: [ 1530.949363] dump_stack+0x172/0x1f0 [ 1530.953016] dump_header+0x15e/0xa55 [ 1530.956771] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1530.961910] ? ___ratelimit+0x60/0x595 [ 1530.965831] ? do_raw_spin_unlock+0x57/0x270 [ 1530.970267] oom_kill_process.cold+0x10/0x6ef [ 1530.974801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1530.980367] ? task_will_free_mem+0x139/0x6e0 [ 1530.984899] out_of_memory+0x936/0x12d0 [ 1530.988900] ? lock_downgrade+0x810/0x810 [ 1530.993076] ? oom_killer_disable+0x280/0x280 [ 1530.997704] ? find_held_lock+0x35/0x130 [ 1531.001803] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1531.006806] ? memcg_event_wake+0x230/0x230 [ 1531.011247] ? do_raw_spin_unlock+0x57/0x270 [ 1531.015682] ? _raw_spin_unlock+0x2d/0x50 [ 1531.019854] try_charge+0xef7/0x1480 [ 1531.023594] ? find_held_lock+0x35/0x130 [ 1531.027684] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1531.032562] ? kasan_check_read+0x11/0x20 [ 1531.036838] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1531.042760] mem_cgroup_try_charge+0x259/0x6b0 [ 1531.047369] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1531.052323] __handle_mm_fault+0x1e50/0x3f80 [ 1531.056762] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1531.061651] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1531.066695] handle_mm_fault+0x1b5/0x690 [ 1531.070790] __do_page_fault+0x62a/0xe90 [ 1531.074884] ? vmalloc_fault+0x740/0x740 [ 1531.078992] ? trace_hardirqs_off_caller+0x65/0x220 [ 1531.084050] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1531.089011] ? page_fault+0x8/0x30 [ 1531.092582] do_page_fault+0x71/0x57d [ 1531.096407] ? page_fault+0x8/0x30 [ 1531.100020] page_fault+0x1e/0x30 [ 1531.103490] RIP: 0033:0x42ff57 03:49:14 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1531.106711] Code: 00 be 48 3a 4e 00 bf f0 41 4e 00 e8 e3 b8 ff ff 0f 1f 00 48 83 fe bf 0f 87 63 08 00 00 48 89 f0 41 57 41 56 48 83 c0 17 41 55 <41> 54 55 53 48 89 c5 48 83 e5 f0 48 89 fb 48 81 ec 98 00 00 00 48 [ 1531.125877] RSP: 002b:00007fff3bc5e000 EFLAGS: 00010206 [ 1531.125890] RAX: 0000000000008047 RBX: 0000000000715640 RCX: 0000000000458d94 [ 1531.125897] RDX: 00007fff3bc5e040 RSI: 0000000000008030 RDI: 0000000000715640 [ 1531.125905] RBP: 0000000000008030 R08: 0000000000000001 R09: 0000555556092940 [ 1531.125911] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff3bc5f220 [ 1531.125918] R13: 00007fff3bc5f210 R14: 0000000000000000 R15: 00007fff3bc5f220 [ 1531.139605] Task in [ 1531.196102] /syz5 killed as a result of limit of /syz5 03:49:14 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:15 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1531.228815] memory: usage 4200kB, limit 0kB, failcnt 97 [ 1531.250353] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1531.290319] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1531.314329] Memory cgroup stats for /syz5: cache:0KB rss:52KB rss_huge:0KB shmem:64KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB 03:49:15 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1531.385054] Memory cgroup out of memory: Kill process 30983 (syz-executor.5) score 8759000 or sacrifice child [ 1531.444481] Killed process 30983 (syz-executor.5) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 1531.502875] oom_reaper: reaped process 30983 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 03:49:15 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:15 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b", 0x4e}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:15 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd", 0x3f}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) wait4(r2, 0x0, 0x80000000, &(0x7f0000000380)) r3 = accept4$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{}, [@remote, @rose, @remote, @default, @default, @bcast, @remote, @null]}, &(0x7f0000000140)=0x48, 0x0) recvmmsg(r3, &(0x7f0000000300)=[{{&(0x7f0000000180)=@sco, 0x80, &(0x7f00000002c0)=[{&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000000200)=""/189, 0xbd}], 0x2}, 0x3}], 0x1, 0x2, &(0x7f0000000340)={0x0, 0x1c9c380}) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:49:15 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000006488aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:49:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf28}], 0x1}}], 0x2, 0x0, 0x0) [ 1533.205747] device bridge_slave_1 left promiscuous mode [ 1533.211420] bridge0: port 2(bridge_slave_1) entered disabled state [ 1533.267068] device bridge_slave_0 left promiscuous mode [ 1533.272555] bridge0: port 1(bridge_slave_0) entered disabled state [ 1533.400790] device hsr_slave_1 left promiscuous mode [ 1533.448171] device hsr_slave_0 left promiscuous mode [ 1533.489076] team0 (unregistering): Port device team_slave_1 removed [ 1533.500965] team0 (unregistering): Port device team_slave_0 removed [ 1533.512222] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1533.553415] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1533.632586] bond0 (unregistering): Released all slaves [ 1533.691908] IPVS: ftp: loaded support on port[0] = 21 [ 1533.773875] chnl_net:caif_netlink_parms(): no params data found [ 1533.809094] bridge0: port 1(bridge_slave_0) entered blocking state [ 1533.815948] bridge0: port 1(bridge_slave_0) entered disabled state [ 1533.823225] device bridge_slave_0 entered promiscuous mode [ 1533.830524] bridge0: port 2(bridge_slave_1) entered blocking state [ 1533.837051] bridge0: port 2(bridge_slave_1) entered disabled state [ 1533.846064] device bridge_slave_1 entered promiscuous mode [ 1533.899960] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1533.910307] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1533.937802] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1533.946129] team0: Port device team_slave_0 added [ 1533.952161] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1533.960691] team0: Port device team_slave_1 added [ 1533.966373] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1533.975141] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1534.042034] device hsr_slave_0 entered promiscuous mode [ 1534.094756] device hsr_slave_1 entered promiscuous mode [ 1534.139813] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1534.147583] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1534.180022] bridge0: port 2(bridge_slave_1) entered blocking state [ 1534.186470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1534.193126] bridge0: port 1(bridge_slave_0) entered blocking state [ 1534.199554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1534.292748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1534.310131] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1534.323806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1534.338209] bridge0: port 1(bridge_slave_0) entered disabled state [ 1534.349919] bridge0: port 2(bridge_slave_1) entered disabled state [ 1534.366928] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1534.373054] 8021q: adding VLAN 0 to HW filter on device team0 [ 1534.390133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1534.403305] bridge0: port 1(bridge_slave_0) entered blocking state [ 1534.409788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1534.439726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1534.448460] bridge0: port 2(bridge_slave_1) entered blocking state [ 1534.454904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1534.467937] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1534.485499] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1534.493246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1534.501743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1534.514079] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1534.526720] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1534.532881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1534.540600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1534.557660] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1534.570846] 8021q: adding VLAN 0 to HW filter on device batadv0 03:49:18 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:49:18 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd", 0x3f}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:18 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b", 0x4e}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:18 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write(r0, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xfffffffffffffe94) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x8}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:49:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf30}], 0x1}}], 0x2, 0x0, 0x0) 03:49:18 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:18 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b", 0x4e}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1534.908840] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 03:49:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000800)='/dev/swradio#\x00', 0x0, 0x2) openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x20000, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) write(r2, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x0, 0x2}, 0xc) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000240)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYRES32=r5, @ANYBLOB="a2000000671e8491e3c8b3080e01f4f87903ddebdcf9f46b5cae000001009f6e93d1897e23ab64c7fd9e99275b57fc64bf5c0312fee93c7dfe52871c7e8e467c63dadfcdd0a819e9b78635d5f4106b5de76a3c3c849087cd0bcad4ff014829b3f23727a428a76deae2f1ec6ab784e5ed5eb5abe3a40220bc778dd9859b50da8f0fe342a5c907d14b1833d8e5074d7a8e8967521ee05b35d775c7405b6f465cc04fc2432051ac9a5c13bb52"], &(0x7f0000000200)=0xaa) recvmmsg(r2, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:49:18 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1535.051429] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1535.090742] CPU: 1 PID: 31054 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1535.097828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1535.107236] Call Trace: [ 1535.109858] dump_stack+0x172/0x1f0 [ 1535.113528] dump_header+0x15e/0xa55 [ 1535.117297] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1535.122549] ? ___ratelimit+0x60/0x595 [ 1535.126487] ? do_raw_spin_unlock+0x57/0x270 [ 1535.131034] oom_kill_process.cold+0x10/0x6ef [ 1535.135566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1535.141140] ? task_will_free_mem+0x139/0x6e0 [ 1535.145675] out_of_memory+0x936/0x12d0 [ 1535.149710] ? oom_killer_disable+0x280/0x280 [ 1535.154227] ? cgroup_file_notify+0x140/0x1b0 [ 1535.158756] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1535.163627] ? memcg_event_wake+0x230/0x230 [ 1535.167989] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1535.173133] ? cgroup_file_notify+0x140/0x1b0 [ 1535.177666] memory_max_write+0x169/0x300 [ 1535.182031] ? mem_cgroup_write+0x360/0x360 [ 1535.186416] ? lock_acquire+0x16f/0x3f0 [ 1535.190426] ? kernfs_fop_write+0x227/0x480 [ 1535.194877] cgroup_file_write+0x241/0x790 [ 1535.199146] ? mem_cgroup_write+0x360/0x360 [ 1535.203492] ? kill_css+0x380/0x380 [ 1535.207207] ? kill_css+0x380/0x380 [ 1535.212693] kernfs_fop_write+0x2b8/0x480 [ 1535.217051] __vfs_write+0x114/0x810 [ 1535.221665] ? kernfs_fop_open+0xd80/0xd80 [ 1535.225927] ? kernel_read+0x120/0x120 [ 1535.229853] ? __lock_is_held+0xb6/0x140 [ 1535.233953] ? rcu_read_lock_sched_held+0x110/0x130 [ 1535.238990] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1535.243775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1535.249522] ? __sb_start_write+0x1a9/0x360 [ 1535.254058] vfs_write+0x20c/0x560 [ 1535.257629] ksys_write+0x14f/0x2d0 [ 1535.261284] ? __ia32_sys_read+0xb0/0xb0 [ 1535.265370] ? do_syscall_64+0x26/0x620 [ 1535.269367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1535.274759] ? do_syscall_64+0x26/0x620 [ 1535.278767] __x64_sys_write+0x73/0xb0 [ 1535.282738] do_syscall_64+0xfd/0x620 [ 1535.286570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1535.291786] RIP: 0033:0x459a29 [ 1535.294998] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1535.313936] RSP: 002b:00007f4fe1ae9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1535.321671] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1535.328954] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1535.336246] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1535.343641] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fe1aea6d4 03:49:19 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b", 0x51}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1535.350926] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff 03:49:19 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1535.564311] Task in /syz2 killed as a result of limit of /syz2 [ 1535.572511] memory: usage 3336kB, limit 0kB, failcnt 271934 [ 1535.766982] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1535.780528] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:49:19 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1535.797406] Memory cgroup stats for /syz2: cache:156KB rss:2268KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2204KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1535.818678] Memory cgroup out of memory: Kill process 31049 (syz-executor.2) score 9275000 or sacrifice child [ 1535.829390] Killed process 31054 (syz-executor.2) total-vm:72712kB, anon-rss:2196kB, file-rss:35812kB, shmem-rss:0kB [ 1535.843705] oom_reaper: reaped process 31054 (syz-executor.2), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 1537.192082] IPVS: ftp: loaded support on port[0] = 21 [ 1537.350594] chnl_net:caif_netlink_parms(): no params data found [ 1537.443218] bridge0: port 1(bridge_slave_0) entered blocking state [ 1537.459741] bridge0: port 1(bridge_slave_0) entered disabled state [ 1537.472831] device bridge_slave_0 entered promiscuous mode [ 1537.483699] bridge0: port 2(bridge_slave_1) entered blocking state [ 1537.498493] bridge0: port 2(bridge_slave_1) entered disabled state [ 1537.509852] device bridge_slave_1 entered promiscuous mode [ 1537.557934] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1537.573794] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1537.620274] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1537.632578] team0: Port device team_slave_0 added [ 1537.641143] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1537.652888] team0: Port device team_slave_1 added [ 1537.660517] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1537.672428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1537.739829] device hsr_slave_0 entered promiscuous mode [ 1537.788593] device hsr_slave_1 entered promiscuous mode [ 1537.829039] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1537.837961] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1537.870961] bridge0: port 2(bridge_slave_1) entered blocking state [ 1537.877585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1537.884364] bridge0: port 1(bridge_slave_0) entered blocking state [ 1537.890734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1537.968032] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1537.975453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1537.988789] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1538.002397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1538.011565] bridge0: port 1(bridge_slave_0) entered disabled state [ 1538.020836] bridge0: port 2(bridge_slave_1) entered disabled state [ 1538.029374] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1538.044197] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1538.051044] 8021q: adding VLAN 0 to HW filter on device team0 [ 1538.074998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1538.083021] bridge0: port 1(bridge_slave_0) entered blocking state [ 1538.089554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1538.110271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1538.118296] bridge0: port 2(bridge_slave_1) entered blocking state [ 1538.125110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1538.156006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1538.167178] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1538.175534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1538.189991] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1538.201264] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1538.213500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1538.221870] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1538.236962] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1538.259347] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1538.291133] 8021q: adding VLAN 0 to HW filter on device batadv0 03:49:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x200000, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x13, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:49:22 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b", 0x51}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:22 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) 03:49:22 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf38}], 0x1}}], 0x2, 0x0, 0x0) 03:49:22 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe80000000000000000000000003e8aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:49:22 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b", 0x51}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:49:22 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:49:22 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:49:22 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e", 0x52}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1538.672871] device lo entered promiscuous mode [ 1538.690413] device lo left promiscuous mode 03:49:22 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1538.798740] device lo entered promiscuous mode [ 1538.820226] device lo left promiscuous mode 03:50:19 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:19 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:19 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e", 0x52}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:50:19 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:50:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf40}], 0x1}}], 0x2, 0x0, 0x0) 03:50:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r2, 0x4) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:50:19 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1596.131015] device lo entered promiscuous mode [ 1596.148586] device lo left promiscuous mode 03:50:19 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e", 0x52}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:50:20 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:20 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) [ 1596.348899] device lo entered promiscuous mode 03:50:20 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1596.394445] device lo left promiscuous mode 03:50:20 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1596.648027] device bridge_slave_1 left promiscuous mode [ 1596.658232] bridge0: port 2(bridge_slave_1) entered disabled state [ 1596.737006] device bridge_slave_0 left promiscuous mode [ 1596.749357] bridge0: port 1(bridge_slave_0) entered disabled state [ 1596.983057] device hsr_slave_1 left promiscuous mode [ 1597.039362] device hsr_slave_0 left promiscuous mode [ 1597.099731] team0 (unregistering): Port device team_slave_1 removed [ 1597.111179] team0 (unregistering): Port device team_slave_0 removed [ 1597.123102] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1597.161343] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1597.247922] bond0 (unregistering): Released all slaves [ 1598.160979] IPVS: ftp: loaded support on port[0] = 21 [ 1598.256598] chnl_net:caif_netlink_parms(): no params data found [ 1598.292620] bridge0: port 1(bridge_slave_0) entered blocking state [ 1598.299522] bridge0: port 1(bridge_slave_0) entered disabled state [ 1598.307922] device bridge_slave_0 entered promiscuous mode [ 1598.315587] bridge0: port 2(bridge_slave_1) entered blocking state [ 1598.322027] bridge0: port 2(bridge_slave_1) entered disabled state [ 1598.329639] device bridge_slave_1 entered promiscuous mode [ 1598.350187] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1598.359842] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1598.386542] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1598.401061] team0: Port device team_slave_0 added [ 1598.407115] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1598.414901] team0: Port device team_slave_1 added [ 1598.420398] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1598.428029] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1598.490464] device hsr_slave_0 entered promiscuous mode [ 1598.534716] device hsr_slave_1 entered promiscuous mode [ 1598.594945] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1598.602053] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1598.633331] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1598.696839] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1598.703113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1598.712054] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1598.723979] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1598.731318] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1598.740014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1598.747458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1598.758298] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1598.765069] 8021q: adding VLAN 0 to HW filter on device team0 [ 1598.773866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1598.781764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1598.790102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1598.798861] bridge0: port 1(bridge_slave_0) entered blocking state [ 1598.805561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1598.815194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1598.823681] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1598.831797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1598.840470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1598.848394] bridge0: port 2(bridge_slave_1) entered blocking state [ 1598.855767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1598.874643] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1598.882925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1598.893413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1598.908193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1598.923315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1598.932601] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1598.939233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1598.957114] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1598.969484] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1599.070966] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1599.082814] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1599.089270] CPU: 0 PID: 31161 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1599.096237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1599.105680] Call Trace: [ 1599.108282] dump_stack+0x172/0x1f0 [ 1599.111913] dump_header+0x15e/0xa55 [ 1599.115630] ? oom_kill_process+0x136/0x150 [ 1599.119946] oom_kill_process.cold+0x10/0x6ef [ 1599.124493] out_of_memory+0x936/0x12d0 [ 1599.128514] ? oom_killer_disable+0x280/0x280 [ 1599.133034] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1599.137871] ? memcg_event_wake+0x230/0x230 [ 1599.142207] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1599.148288] ? cgroup_file_notify+0x140/0x1b0 [ 1599.152812] memory_max_write+0x169/0x300 [ 1599.156971] ? mem_cgroup_write+0x360/0x360 [ 1599.161289] cgroup_file_write+0x241/0x790 [ 1599.165558] ? mem_cgroup_write+0x360/0x360 [ 1599.169907] ? kill_css+0x380/0x380 [ 1599.173541] ? kill_css+0x380/0x380 [ 1599.177173] kernfs_fop_write+0x2b8/0x480 [ 1599.181328] __vfs_write+0x114/0x810 [ 1599.185048] ? kernfs_fop_open+0xd80/0xd80 [ 1599.189301] ? kernel_read+0x120/0x120 [ 1599.193191] ? __lock_is_held+0xb6/0x140 [ 1599.197251] ? rcu_read_lock_sched_held+0x110/0x130 [ 1599.202256] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1599.207039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1599.212595] ? __sb_start_write+0x1a9/0x360 [ 1599.216927] vfs_write+0x20c/0x560 [ 1599.220599] ksys_write+0x14f/0x2d0 [ 1599.224230] ? __ia32_sys_read+0xb0/0xb0 [ 1599.228329] ? do_syscall_64+0x26/0x620 [ 1599.232550] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1599.238171] ? do_syscall_64+0x26/0x620 [ 1599.242144] __x64_sys_write+0x73/0xb0 [ 1599.246302] do_syscall_64+0xfd/0x620 [ 1599.250109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1599.255534] RIP: 0033:0x459a29 [ 1599.258728] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1599.277627] RSP: 002b:00007f128c960c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1599.285579] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1599.292853] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1599.300122] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1599.307402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f128c9616d4 [ 1599.314864] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1599.327509] Task in /syz2 killed as a result of limit of /syz2 [ 1599.334075] memory: usage 3220kB, limit 0kB, failcnt 586712 [ 1599.340296] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1599.347814] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1599.355217] Memory cgroup stats for /syz2: cache:156KB rss:2120KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2172KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1599.378010] Memory cgroup out of memory: Kill process 31160 (syz-executor.2) score 9274000 or sacrifice child [ 1599.389816] Killed process 31160 (syz-executor.2) total-vm:72584kB, anon-rss:2184kB, file-rss:35804kB, shmem-rss:0kB [ 1599.403751] oom_reaper: reaped process 31160 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 03:50:23 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000f0ffffaa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:50:23 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:50:23 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:50:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:50:23 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf48}], 0x1}}], 0x2, 0x0, 0x0) [ 1599.573964] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1599.576587] device lo entered promiscuous mode [ 1599.592532] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1599.599043] CPU: 0 PID: 31157 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1599.606003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1599.608295] device lo left promiscuous mode [ 1599.615509] Call Trace: [ 1599.615532] dump_stack+0x172/0x1f0 [ 1599.615551] dump_header+0x15e/0xa55 [ 1599.615566] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1599.615586] ? ___ratelimit+0x60/0x595 [ 1599.615600] ? do_raw_spin_unlock+0x57/0x270 [ 1599.615615] oom_kill_process.cold+0x10/0x6ef [ 1599.615632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1599.615646] ? task_will_free_mem+0x139/0x6e0 [ 1599.615664] out_of_memory+0x936/0x12d0 [ 1599.615678] ? lock_downgrade+0x810/0x810 [ 1599.615694] ? oom_killer_disable+0x280/0x280 [ 1599.615705] ? find_held_lock+0x35/0x130 [ 1599.615726] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1599.615738] ? memcg_event_wake+0x230/0x230 [ 1599.615754] ? do_raw_spin_unlock+0x57/0x270 [ 1599.615767] ? _raw_spin_unlock+0x2d/0x50 [ 1599.615780] try_charge+0xef7/0x1480 [ 1599.615793] ? find_held_lock+0x35/0x130 [ 1599.615814] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1599.615835] ? kasan_check_read+0x11/0x20 [ 1599.615860] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1599.615876] mem_cgroup_try_charge+0x259/0x6b0 [ 1599.615892] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1599.615909] __handle_mm_fault+0x1e50/0x3f80 [ 1599.615928] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1599.615957] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1599.615972] handle_mm_fault+0x1b5/0x690 [ 1599.615990] __do_page_fault+0x62a/0xe90 [ 1599.616002] ? ksys_write+0x1f1/0x2d0 [ 1599.616025] ? vmalloc_fault+0x740/0x740 [ 1599.765656] ? trace_hardirqs_off_caller+0x65/0x220 [ 1599.770693] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1599.775843] ? page_fault+0x8/0x30 [ 1599.779400] do_page_fault+0x71/0x57d [ 1599.783642] ? page_fault+0x8/0x30 [ 1599.787188] page_fault+0x1e/0x30 [ 1599.790636] RIP: 0033:0x4034f2 [ 1599.793913] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 1599.813352] RSP: 002b:00007ffce704c000 EFLAGS: 00010246 03:50:23 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe800000000000000000008dffffffaa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:50:23 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1599.818821] RAX: 0000000000000000 RBX: 000000000018662e RCX: 0000000000413630 [ 1599.826088] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffce704d130 [ 1599.833369] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555eac940 [ 1599.841201] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffce704d130 [ 1599.848499] R13: 00007ffce704d120 R14: 0000000000000000 R15: 00007ffce704d130 [ 1599.859379] Task in /syz2 killed as a result of limit of /syz2 [ 1599.866267] memory: usage 868kB, limit 0kB, failcnt 586720 [ 1599.872257] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1599.879631] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1599.886172] Memory cgroup stats for /syz2: cache:156KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1599.906685] Memory cgroup out of memory: Kill process 31157 (syz-executor.2) score 8759000 or sacrifice child 03:50:23 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) [ 1599.917367] Killed process 31157 (syz-executor.2) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 1599.928834] oom_reaper: reaped process 31157 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:50:23 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:23 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1600.053753] device lo entered promiscuous mode 03:50:23 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1600.075742] device lo left promiscuous mode 03:50:23 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:23 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:50:23 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) [ 1600.268354] device lo entered promiscuous mode [ 1600.295353] device lo left promiscuous mode 03:50:24 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000030000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:50:24 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf50}], 0x1}}], 0x2, 0x0, 0x0) 03:50:24 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:50:24 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) 03:50:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) r2 = accept$alg(r1, 0x0, 0x0) write(r2, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) recvmmsg(r2, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1600.521339] device lo entered promiscuous mode 03:50:24 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000040000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1600.553266] device lo left promiscuous mode 03:50:24 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:24 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:50:24 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:50:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r2, 0x200, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x4, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x141d9709915b6db) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r3, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1600.736175] device bridge_slave_1 left promiscuous mode [ 1600.741747] bridge0: port 2(bridge_slave_1) entered disabled state 03:50:24 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1600.826002] device bridge_slave_0 left promiscuous mode [ 1600.832830] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:24 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1601.054381] protocol 88fb is buggy, dev hsr_slave_0 [ 1601.059578] protocol 88fb is buggy, dev hsr_slave_1 [ 1601.138234] device hsr_slave_1 left promiscuous mode [ 1601.179239] device hsr_slave_0 left promiscuous mode [ 1601.228794] team0 (unregistering): Port device team_slave_1 removed [ 1601.255915] team0 (unregistering): Port device team_slave_0 removed [ 1601.278373] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1601.339544] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1601.536491] bond0 (unregistering): Released all slaves [ 1601.614350] protocol 88fb is buggy, dev hsr_slave_0 [ 1601.620280] protocol 88fb is buggy, dev hsr_slave_1 [ 1601.625867] protocol 88fb is buggy, dev hsr_slave_0 [ 1601.631048] protocol 88fb is buggy, dev hsr_slave_1 [ 1601.642166] device lo entered promiscuous mode [ 1601.651183] device lo left promiscuous mode [ 1602.724358] IPVS: ftp: loaded support on port[0] = 21 [ 1602.815967] chnl_net:caif_netlink_parms(): no params data found [ 1602.852247] bridge0: port 1(bridge_slave_0) entered blocking state [ 1602.860396] bridge0: port 1(bridge_slave_0) entered disabled state [ 1602.867743] device bridge_slave_0 entered promiscuous mode [ 1602.875620] bridge0: port 2(bridge_slave_1) entered blocking state [ 1602.882238] bridge0: port 2(bridge_slave_1) entered disabled state [ 1602.889712] device bridge_slave_1 entered promiscuous mode [ 1602.907141] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1602.916751] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1602.933681] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1602.941859] team0: Port device team_slave_0 added [ 1602.947840] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1602.957013] team0: Port device team_slave_1 added [ 1602.962920] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1602.970904] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1603.037274] device hsr_slave_0 entered promiscuous mode [ 1603.075041] device hsr_slave_1 entered promiscuous mode [ 1603.115252] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1603.123277] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1603.139008] bridge0: port 2(bridge_slave_1) entered blocking state [ 1603.145702] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1603.152504] bridge0: port 1(bridge_slave_0) entered blocking state [ 1603.159300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1603.197466] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1603.203582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1603.213257] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1603.223095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1603.231233] bridge0: port 1(bridge_slave_0) entered disabled state [ 1603.248733] bridge0: port 2(bridge_slave_1) entered disabled state [ 1603.257020] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1603.267882] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1603.274067] 8021q: adding VLAN 0 to HW filter on device team0 [ 1603.285173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1603.292801] bridge0: port 1(bridge_slave_0) entered blocking state [ 1603.299270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1603.315433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1603.323197] bridge0: port 2(bridge_slave_1) entered blocking state [ 1603.329621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1603.347606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1603.355803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1603.370617] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1603.381084] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1603.392261] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1603.399350] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1603.407297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1603.416275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1603.424616] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1603.438214] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1603.450064] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1603.573374] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1603.585094] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1603.590836] CPU: 1 PID: 31251 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1603.597958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1603.607432] Call Trace: [ 1603.610033] dump_stack+0x172/0x1f0 [ 1603.614003] dump_header+0x15e/0xa55 [ 1603.617838] ? oom_kill_process+0x136/0x150 [ 1603.622173] oom_kill_process.cold+0x10/0x6ef [ 1603.626677] out_of_memory+0x936/0x12d0 [ 1603.630680] ? oom_killer_disable+0x280/0x280 [ 1603.635229] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1603.640069] ? memcg_event_wake+0x230/0x230 [ 1603.644487] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1603.649933] ? cgroup_file_notify+0x140/0x1b0 [ 1603.654490] memory_max_write+0x169/0x300 [ 1603.658676] ? mem_cgroup_write+0x360/0x360 [ 1603.663084] ? lock_acquire+0x16f/0x3f0 [ 1603.667056] ? kernfs_fop_write+0x227/0x480 [ 1603.671374] cgroup_file_write+0x241/0x790 [ 1603.675608] ? mem_cgroup_write+0x360/0x360 [ 1603.680021] ? kill_css+0x380/0x380 [ 1603.683661] ? kill_css+0x380/0x380 [ 1603.687322] kernfs_fop_write+0x2b8/0x480 [ 1603.691557] ? retint_kernel+0x2d/0x2d [ 1603.695449] __vfs_write+0x114/0x810 [ 1603.699957] ? kernfs_fop_open+0xd80/0xd80 [ 1603.704335] ? kernel_read+0x120/0x120 [ 1603.708321] ? __lock_is_held+0xb6/0x140 [ 1603.712380] ? rcu_read_lock_sched_held+0x110/0x130 [ 1603.717400] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1603.722148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1603.727678] ? __sb_start_write+0x1a9/0x360 [ 1603.732015] vfs_write+0x20c/0x560 [ 1603.735572] ksys_write+0x14f/0x2d0 [ 1603.739221] ? __ia32_sys_read+0xb0/0xb0 [ 1603.743500] ? do_syscall_64+0x26/0x620 [ 1603.747694] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1603.753398] ? do_syscall_64+0x26/0x620 [ 1603.757388] __x64_sys_write+0x73/0xb0 [ 1603.761458] do_syscall_64+0xfd/0x620 [ 1603.765274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1603.770460] RIP: 0033:0x459a29 [ 1603.773671] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1603.792562] RSP: 002b:00007f0c7849ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1603.800425] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1603.807759] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1603.815076] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1603.822346] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0c7849f6d4 [ 1603.829610] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1603.849328] Task in /syz2 killed as a result of limit of /syz2 [ 1603.856672] memory: usage 3228kB, limit 0kB, failcnt 586721 [ 1603.863540] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1603.871149] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1603.877717] Memory cgroup stats for /syz2: cache:156KB rss:2176KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1603.900458] Memory cgroup out of memory: Kill process 31250 (syz-executor.2) score 9273000 or sacrifice child [ 1603.911321] Killed process 31250 (syz-executor.2) total-vm:72584kB, anon-rss:2180kB, file-rss:35812kB, shmem-rss:0kB 03:50:27 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:27 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:50:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200400, 0x10) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000100)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) write(r2, &(0x7f0000000080)="00196eb4fa9200000000ecff0000", 0xe) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000140)={0x7fff, 0x0, 'client0\x00', 0x2, "d4c250394d76ddfd", "d68d7584071d2113ad11be7b3cb12713f1c03c09222f55a653d8e4fb3b77f84f", 0x0, 0xf4}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:50:27 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf58}], 0x1}}], 0x2, 0x0, 0x0) 03:50:27 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) [ 1603.925750] oom_reaper: reaped process 31250 (syz-executor.2), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 1603.954546] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1603.975393] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1603.998298] CPU: 1 PID: 31246 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1604.005463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1604.014836] Call Trace: [ 1604.017586] dump_stack+0x172/0x1f0 [ 1604.021234] dump_header+0x15e/0xa55 [ 1604.024973] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1604.030112] ? ___ratelimit+0x60/0x595 [ 1604.034094] ? do_raw_spin_unlock+0x57/0x270 [ 1604.038517] oom_kill_process.cold+0x10/0x6ef [ 1604.040942] device lo entered promiscuous mode [ 1604.043186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1604.043202] ? task_will_free_mem+0x139/0x6e0 [ 1604.043221] out_of_memory+0x936/0x12d0 [ 1604.049370] device lo left promiscuous mode [ 1604.053371] ? lock_downgrade+0x810/0x810 [ 1604.053392] ? oom_killer_disable+0x280/0x280 [ 1604.053407] ? find_held_lock+0x35/0x130 [ 1604.053433] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1604.084274] ? memcg_event_wake+0x230/0x230 [ 1604.088635] ? do_raw_spin_unlock+0x57/0x270 [ 1604.093162] ? _raw_spin_unlock+0x2d/0x50 [ 1604.097338] try_charge+0xef7/0x1480 [ 1604.101248] ? find_held_lock+0x35/0x130 [ 1604.105425] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1604.110298] ? kasan_check_read+0x11/0x20 [ 1604.114474] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1604.119369] mem_cgroup_try_charge+0x259/0x6b0 [ 1604.123981] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1604.128937] wp_page_copy+0x430/0x16a0 [ 1604.132867] ? finish_task_switch+0x146/0x780 [ 1604.132891] ? pmd_pfn+0x1d0/0x1d0 [ 1604.140927] ? kasan_check_read+0x11/0x20 [ 1604.146929] ? do_raw_spin_unlock+0x57/0x270 [ 1604.146947] do_wp_page+0x57d/0x10b0 [ 1604.146972] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1604.146987] ? kasan_check_write+0x14/0x20 [ 1604.147002] ? do_raw_spin_lock+0xc8/0x240 [ 1604.168355] __handle_mm_fault+0x2305/0x3f80 03:50:27 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r3, 0x0, 0x2}, 0xc) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x0, 0x2}, 0xc) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={r3, 0x6, 0x1, 0x7, 0x5574, 0x622, 0x800, 0x0, {r5, @in6={{0xa, 0x4e24, 0x40, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}, 0x0, 0x800, 0x3a, 0x4, 0xcbd}}, &(0x7f0000000180)=0xb0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r6 = accept$alg(r0, 0x0, 0x0) write(r6, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r6, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1604.172796] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1604.177766] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1604.182462] handle_mm_fault+0x1b5/0x690 [ 1604.186582] __do_page_fault+0x62a/0xe90 [ 1604.192673] ? vmalloc_fault+0x740/0x740 [ 1604.196758] ? trace_hardirqs_off_caller+0x65/0x220 [ 1604.201884] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1604.206851] ? page_fault+0x8/0x30 [ 1604.210822] do_page_fault+0x71/0x57d [ 1604.214632] ? page_fault+0x8/0x30 [ 1604.218185] page_fault+0x1e/0x30 [ 1604.221725] RIP: 0033:0x430b06 03:50:27 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1604.224926] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1604.243844] RSP: 002b:00007ffd126c7010 EFLAGS: 00010206 [ 1604.249751] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1604.257119] RDX: 0000555555e5d930 RSI: 0000555555e65970 RDI: 0000000000000003 [ 1604.264485] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555e5c940 03:50:28 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1604.271790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1604.279249] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1604.311633] Task in /syz2 killed as a result of limit of /syz2 03:50:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000040)={0x90002}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:50:28 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1604.354413] memory: usage 892kB, limit 0kB, failcnt 586729 [ 1604.366667] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1604.390370] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1604.412257] Memory cgroup stats for /syz2: cache:156KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1604.468532] Memory cgroup out of memory: Kill process 31246 (syz-executor.2) score 8758000 or sacrifice child [ 1604.479531] Killed process 31246 (syz-executor.2) total-vm:72452kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 1604.519614] oom_reaper: reaped process 31246 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 03:50:28 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:28 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:50:28 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:28 executing program 3: syz_read_part_table(0x0, 0xaaaaaaaaaaaacc2, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff0a000000ff07000000ffffffa9000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) 03:50:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf60}], 0x1}}], 0x2, 0x0, 0x0) 03:50:28 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1604.899496] device lo entered promiscuous mode [ 1604.918379] device lo left promiscuous mode [ 1604.995761] loop3: p1 p2 p3 < > p4 [ 1605.014420] loop3: partition table partially beyond EOD, truncated 03:50:28 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r2, 0x1, 0x6, @remote}, 0x10) 03:50:28 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1605.052647] loop3: p1 start 10 is beyond EOD, truncated [ 1605.070530] loop3: p2 size 1073741824 extends beyond EOD, truncated 03:50:28 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=@newqdisc={0x444, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x418, 0x2, [@TCA_CBQ_RTAB={0x404}, @TCA_CBQ_RATE={0x10, 0x5, {0x5, 0x0, 0x0, 0x0, 0x0, 0x7f}}]}}]}, 0x444}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'yam0\x00', r5}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r6 = accept$alg(r0, 0x0, 0x0) write(r6, &(0x7f0000000280)="00286eb4fa92000000000000000049112ffe7e2c97d5a451e1ec4d2e57edd83303a15bb56d103f44ded02148448e47c61f99401a3a5ccb9cb1d8386327baaf6467d4db112d4f96981f49d992c1cdfe99f59a2eec2e6dd1e39ddcebb5ad64d7d6024e2aef2031447961d0fa2e705ca478cdf3e2874578bf212167fee42658b7939bd450f80fde588631680cf2f1974f37f6c51e26f70931246e189db19f571fe0307dd78c12e9a4e8455bae3fb4dd7643769de9dce5dc94b74a6957e6a755071780847b3ff927a5adbf0098e8866689ee92c136", 0x4a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r8 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCDELDLCI(r8, 0x8981, &(0x7f0000000380)={'bcsh0\x00', 0x6}) preadv(r7, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) write$UHID_CREATE(r7, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/81, 0x51, 0x0, 0x6, 0x0, 0x5}, 0x120) recvmmsg(r6, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1605.149288] loop3: p3 start 225 is beyond EOD, truncated [ 1605.186604] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1605.214327] protocol 88fb is buggy, dev hsr_slave_0 [ 1605.219591] protocol 88fb is buggy, dev hsr_slave_1 03:50:29 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:29 executing program 3: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$IMGETVERSION(r1, 0x80044942, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) 03:50:29 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:29 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000f00000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:50:29 executing program 3: syz_open_dev$radio(0x0, 0x2, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x10001, 0x8000}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000002c0)) msgctl$IPC_SET(0x0, 0x1, 0x0) r0 = getpid() sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x570, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000780)=ANY=[@ANYBLOB="0000060005007f001f00ff7f0900b20a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00006635813a3dc02e58e9881cea747243c8035ca5083b7f8be5d455ee968dbf309320f7b32b2bf16f962a585b101c1076292321ede55c3e9cf01b5587572fe42c548d589b52170d27b8509047ac497632245b48174107004c53261520346ce326956e2db1edeb1bcc57772bdf9900000000000000000000000000005eae2be1023caeea4fc8841ef169b83287f727d8d7db5c83709f5199320c6af3cb978be5aee4eec3ccda82f03b9179f1dc93bf70b98078da8a2bd87836c20db391cca2f82590021bf38aee21ea268376d315d762542937d163d0870acbd1e513be25bb86df9be95c347ed6889272d3677d19a9"], 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:50:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf68}], 0x1}}], 0x2, 0x0, 0x0) 03:50:29 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1605.855148] protocol 88fb is buggy, dev hsr_slave_0 [ 1605.860345] protocol 88fb is buggy, dev hsr_slave_1 03:50:29 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1606.024471] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31342 comm=syz-executor.0 [ 1606.334340] net_ratelimit: 2 callbacks suppressed [ 1606.334348] protocol 88fb is buggy, dev hsr_slave_0 [ 1606.344543] protocol 88fb is buggy, dev hsr_slave_1 [ 1606.349675] protocol 88fb is buggy, dev hsr_slave_0 [ 1606.354811] protocol 88fb is buggy, dev hsr_slave_1 [ 1606.354909] protocol 88fb is buggy, dev hsr_slave_0 [ 1606.365057] protocol 88fb is buggy, dev hsr_slave_1 [ 1606.386318] device lo entered promiscuous mode [ 1606.410290] device lo left promiscuous mode 03:50:30 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r2, 0x1, 0x6, @remote}, 0x10) [ 1606.654851] device lo entered promiscuous mode [ 1606.668974] device lo left promiscuous mode [ 1607.734194] IPVS: ftp: loaded support on port[0] = 21 [ 1607.759999] device bridge_slave_1 left promiscuous mode [ 1607.767344] bridge0: port 2(bridge_slave_1) entered disabled state [ 1607.805244] device bridge_slave_0 left promiscuous mode [ 1607.810946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1610.907144] device hsr_slave_1 left promiscuous mode [ 1610.977677] device hsr_slave_0 left promiscuous mode [ 1611.018380] team0 (unregistering): Port device team_slave_1 removed [ 1611.031263] team0 (unregistering): Port device team_slave_0 removed [ 1611.041778] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1611.099876] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1611.179509] bond0 (unregistering): Released all slaves [ 1611.289189] chnl_net:caif_netlink_parms(): no params data found [ 1611.327500] bridge0: port 1(bridge_slave_0) entered blocking state [ 1611.333982] bridge0: port 1(bridge_slave_0) entered disabled state [ 1611.341217] device bridge_slave_0 entered promiscuous mode [ 1611.348314] bridge0: port 2(bridge_slave_1) entered blocking state [ 1611.354862] bridge0: port 2(bridge_slave_1) entered disabled state [ 1611.361990] device bridge_slave_1 entered promiscuous mode [ 1611.381102] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1611.390694] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1611.414767] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1611.422621] team0: Port device team_slave_0 added [ 1611.428433] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1611.436144] team0: Port device team_slave_1 added [ 1611.441792] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1611.484930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1611.557866] device hsr_slave_0 entered promiscuous mode [ 1611.600362] device hsr_slave_1 entered promiscuous mode [ 1611.695013] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1611.702420] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1611.740114] bridge0: port 2(bridge_slave_1) entered blocking state [ 1611.746817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1611.753677] bridge0: port 1(bridge_slave_0) entered blocking state [ 1611.760126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1611.877276] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1611.891169] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1611.905108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1611.914159] bridge0: port 1(bridge_slave_0) entered disabled state [ 1611.923135] bridge0: port 2(bridge_slave_1) entered disabled state [ 1611.938199] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1611.945269] 8021q: adding VLAN 0 to HW filter on device team0 [ 1611.958182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1611.973902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1611.980787] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1612.011959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1612.021762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1612.028295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1612.047280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1612.056106] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1612.076488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1612.093235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1612.110746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1612.123136] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1612.132505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1612.171899] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1612.203593] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1612.398765] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1612.411084] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1612.418831] CPU: 0 PID: 31365 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1612.425789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1612.435609] Call Trace: [ 1612.438227] dump_stack+0x172/0x1f0 [ 1612.441951] dump_header+0x15e/0xa55 [ 1612.445884] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1612.451093] ? ___ratelimit+0x60/0x595 [ 1612.454993] ? do_raw_spin_unlock+0x57/0x270 [ 1612.459427] oom_kill_process.cold+0x10/0x6ef [ 1612.464205] out_of_memory+0x936/0x12d0 [ 1612.468192] ? oom_killer_disable+0x280/0x280 [ 1612.472698] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1612.477540] ? memcg_event_wake+0x230/0x230 [ 1612.482037] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1612.487509] ? cgroup_file_notify+0x140/0x1b0 [ 1612.492053] memory_max_write+0x169/0x300 [ 1612.496228] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1612.501018] ? mem_cgroup_write+0x360/0x360 [ 1612.505340] ? lock_acquire+0x16f/0x3f0 [ 1612.509323] ? kernfs_fop_write+0x227/0x480 [ 1612.513641] cgroup_file_write+0x241/0x790 [ 1612.517971] ? mem_cgroup_write+0x360/0x360 [ 1612.522281] ? kill_css+0x380/0x380 [ 1612.525917] ? kill_css+0x380/0x380 [ 1612.529588] kernfs_fop_write+0x2b8/0x480 [ 1612.533741] __vfs_write+0x114/0x810 [ 1612.537464] ? kernfs_fop_open+0xd80/0xd80 [ 1612.541687] ? kernel_read+0x120/0x120 [ 1612.545579] ? __lock_is_held+0xb6/0x140 [ 1612.550255] ? rcu_read_lock_sched_held+0x110/0x130 [ 1612.555275] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1612.560036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1612.565694] ? __sb_start_write+0x1a9/0x360 [ 1612.570115] vfs_write+0x20c/0x560 [ 1612.573665] ksys_write+0x14f/0x2d0 [ 1612.577313] ? __ia32_sys_read+0xb0/0xb0 [ 1612.581468] ? do_syscall_64+0x26/0x620 [ 1612.585445] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1612.590821] ? do_syscall_64+0x26/0x620 [ 1612.597659] __x64_sys_write+0x73/0xb0 [ 1612.601552] do_syscall_64+0xfd/0x620 [ 1612.605358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1612.610778] RIP: 0033:0x459a29 [ 1612.613984] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1612.632881] RSP: 002b:00007f0979053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1612.641025] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1612.648563] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1612.656172] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1612.663604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09790546d4 [ 1612.670879] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1612.698907] Task in /syz2 killed as a result of limit of /syz2 [ 1612.709287] memory: usage 3200kB, limit 0kB, failcnt 586730 [ 1612.716892] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1612.727902] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1612.734205] Memory cgroup stats for /syz2: cache:156KB rss:2220KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1612.764707] Memory cgroup out of memory: Kill process 31364 (syz-executor.2) score 9273000 or sacrifice child [ 1612.775982] Killed process 31364 (syz-executor.2) total-vm:72584kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 1612.790061] oom_reaper: reaped process 31364 (syz-executor.2), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 03:50:36 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:36 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$bt_hci(r0, 0x0, 0x61, &(0x7f00001e3000)=""/30, &(0x7f0000000000)=0x6a) 03:50:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f00000028c0)) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f0000000800)={0x2d, 0x1}) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x4}}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000100)="af2eb61715df7684", 0x8}, {&(0x7f0000000140)="4123fda6051abc5517b6ed07ba40f884d7ad6f1533bf165db3d54a15e07815d58bf78abd382a94de157b40c53a4df76c280589d8fc89859aa7eb86d20d9b04cae53e929377cdc3f99af19d9cd8c942bbaee301d7580123b077867e7d7b4c6504162f3c7d2008e9427a3ca8c559bba8bfe270870ec36b2d92d9aee7c0d669fc17ba877c14aaa38852b1758e50c5bb1fd84b3058d2e36770660739e0bb030c24dc8236f96a9623036f4e254562ef474b0e52bef3a4f945a98b1251ff6458643d1ce274a0c4b1a822a81651fead9ea9b8a49f36150db7ae4f9f", 0xd8}, {&(0x7f0000000240)="0e0c72eea339044cd6c7dc017a34a28f5eebffa55da27ecd1eaf45eb618cc7ebc0c801affb52897844d673f7f0253b64937a39da1c4841a256f29773a2de7b5115343d713ba1abf971182fd8365db5091db87d978febed7fcbd1a60a8b05458f56df5997b8fb683f43bfa76dcaafde29f0cc83978465c0c731782d64fed256c9845b635608ff745cd50f19b92ef9a80e1792ca12546b2950db7c8cfdf1f4d8652a9c93b786df772c42a57ae40ea656ee5bb86f6ce64cce6195195df4", 0xbc}, {&(0x7f0000000300)="85d239916ca8e18f582ebdd5a1ff42111846b7dd491eb502fa00c145c6fc7352ea2d37b462bbc58b3296901d728b690da64a2f942a5a7f2448a76bae95b285bfe467ae72e1a37281", 0x48}, {&(0x7f0000000380)="bcbe37a0e3b99d862a01fdd3a0fcbae00d5f13b13f2f031a7494203906de91f99e2aa984a99429bb9882324265a3562f1614ef5673f29f2987b62b936e2fc9d3a0ef667866e412a6cfb34cd5fe9bb2778f72ccde93d1aaaaea92677e69a1e88c20ecf7d01cdc11f81513572ec1f447f2ee5d84df8e55aeb3055cd9a76367cc4b34837cb5bf5e84c453e82eb56e8a909526766c0443bdee90a8a09d", 0x9b}, {&(0x7f0000001840)="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", 0x1000}, {&(0x7f0000000440)="a66ed6f308724e0459a22cf13f5376d8cddf92bc9d895adb3ac6e45151948b026ee40494c53e5e6adada8f3b46b0ebbea289158f33418478a4cac7a807cfc8592fc3effc1e66c7f973b420219abb08c718e561c9a50e5860ec6a7b908b709c6d5aeb8fe19f3e8f2f5b6898e2c6c7e7c4b50d6e96e1f2f7e23fa0ad0c9bffc0dec5796dad6256a0ed7d3b217be184192c19bbf2f92e5423f2393baaf1ea0883641f15163169fb50e509cd8c4b69cbb6f4ff7221f734c6e0d0f8f8c54bf328b39145005d7718799d811a731362ab13e0b9619c82f826e1cf74b9c6520a5d", 0xdd}, {&(0x7f0000000540)="db0bfd4b5810bd59298aa9d4e4410fe203ce4c39edfdf885465df279d3af9510c80ce9dd5f51bc78176f5a7b2a52197c679585bb56cab9f180ff8881aedd5c408da59587fe1e32c849c8d8727e9dec492c24e03a157aada43ef92102b6153d41f75a6302e94a996dd169b85b80749f35164c57b475800207490bb391f1c8a7137ddba931dda48034438c9f9a280ba4", 0x8f}, {&(0x7f0000000600)="3f00ed1050ef3c0ee6c748b2117a5786ba38e5dee2c503e5ef4695c9125091587296adbb48ddab5bf2d23e14228b9e7e466e31b3175fb189c76eeed93e84830e493d68f4c79b878aa14a4e16cd2a2ae8c48af7deb598bcbd9857b10affdb4226251b2a10b186b93258477ed9b3c162eb9171ae24ec6810b7afd306fd2ad6631fe411725d95bf3c74a794a7279756f939467aff1f317b929e910de88549d55846eae4", 0xa2}], 0x9, &(0x7f0000002840)="da3c336115bf43540bbc39556c7c8c557a3ded34e441726f43838b07db6ec0e7b27493dbe15d2c428034f4d74d528e04b8b0e9e67632c2cbac83b7f0cebc8b8a7c9dd8dd953d5246a3ec405f26c385", 0x4f, 0x20000000}, 0x80) socket$inet6(0xa, 0x5, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:50:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf70}], 0x1}}], 0x2, 0x0, 0x0) 03:50:36 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r2, 0x1, 0x6, @remote}, 0x10) [ 1613.116173] syz-executor.2 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=0, oom_score_adj=0 [ 1613.133541] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1613.140042] CPU: 1 PID: 31361 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1613.147007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1613.156553] Call Trace: [ 1613.159166] dump_stack+0x172/0x1f0 [ 1613.162830] dump_header+0x15e/0xa55 [ 1613.166574] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1613.171871] ? ___ratelimit+0x60/0x595 [ 1613.176823] ? do_raw_spin_unlock+0x57/0x270 [ 1613.181349] oom_kill_process.cold+0x10/0x6ef [ 1613.185874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1613.191529] ? task_will_free_mem+0x139/0x6e0 [ 1613.196052] ? find_held_lock+0x35/0x130 [ 1613.197552] device lo entered promiscuous mode [ 1613.200571] out_of_memory+0x936/0x12d0 [ 1613.200588] ? lock_downgrade+0x810/0x810 [ 1613.200603] ? oom_killer_disable+0x280/0x280 [ 1613.200616] ? find_held_lock+0x35/0x130 [ 1613.200640] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1613.200655] ? memcg_event_wake+0x230/0x230 [ 1613.200674] ? do_raw_spin_unlock+0x57/0x270 [ 1613.200691] ? _raw_spin_unlock+0x2d/0x50 [ 1613.235235] device lo left promiscuous mode [ 1613.236823] try_charge+0xef7/0x1480 [ 1613.236847] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1613.236868] ? rcu_read_lock_sched_held+0x110/0x130 [ 1613.236882] ? __alloc_pages_nodemask+0x632/0x750 03:50:37 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000500aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1613.236903] memcg_kmem_charge_memcg+0x7c/0x130 [ 1613.236917] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1613.236933] ? cache_grow_begin+0x597/0x8c0 [ 1613.277381] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1613.281988] ? trace_hardirqs_on+0x67/0x220 [ 1613.286466] cache_grow_begin+0x3fa/0x8c0 [ 1613.290690] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1613.296364] ? __cpuset_node_allowed+0x136/0x540 [ 1613.301150] fallback_alloc+0x1fd/0x2d0 [ 1613.305161] ____cache_alloc_node+0x1be/0x1e0 [ 1613.309713] kmem_cache_alloc+0x1f3/0x700 [ 1613.314043] ? __save_stack_trace+0x99/0x100 [ 1613.318483] __alloc_file+0x27/0x330 [ 1613.322234] alloc_empty_file+0x72/0x170 [ 1613.326329] path_openat+0xef/0x45e0 [ 1613.330060] ? __lock_acquire+0x6ee/0x49c0 [ 1613.334318] ? getname+0x1a/0x20 [ 1613.337705] ? do_sys_open+0x2c9/0x550 [ 1613.341633] ? __x64_sys_open+0x7e/0xc0 [ 1613.345675] ? do_syscall_64+0xfd/0x620 [ 1613.349724] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1613.355364] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1613.360063] ? __lock_is_held+0xb6/0x140 03:50:37 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1613.364381] ? find_held_lock+0x35/0x130 [ 1613.368471] ? __alloc_fd+0x44d/0x560 [ 1613.372395] do_filp_open+0x1a1/0x280 [ 1613.376227] ? may_open_dev+0x100/0x100 [ 1613.380357] ? lock_downgrade+0x810/0x810 [ 1613.384550] ? kasan_check_read+0x11/0x20 [ 1613.388727] ? do_raw_spin_unlock+0x57/0x270 [ 1613.393254] ? _raw_spin_unlock+0x2d/0x50 [ 1613.397619] ? __alloc_fd+0x44d/0x560 [ 1613.402583] do_sys_open+0x3fe/0x550 [ 1613.406328] ? filp_open+0x80/0x80 [ 1613.409984] ? __detach_mounts+0x320/0x320 [ 1613.414491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1613.419532] ? do_syscall_64+0x26/0x620 [ 1613.423549] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1613.429026] ? do_syscall_64+0x26/0x620 [ 1613.433040] __x64_sys_open+0x7e/0xc0 [ 1613.436883] do_syscall_64+0xfd/0x620 [ 1613.440896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1613.446106] RIP: 0033:0x4579a0 03:50:37 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1613.449324] Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 [ 1613.468318] RSP: 002b:00007fff8624ef90 EFLAGS: 00000206 ORIG_RAX: 0000000000000002 [ 1613.476136] RAX: ffffffffffffffda RBX: 0000000000189a29 RCX: 00000000004579a0 [ 1613.483861] RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007fff86250170 [ 1613.491153] RBP: 0000000000000002 R08: 0000000000000001 R09: 000055555636d940 [ 1613.498531] R10: 0000000000000000 R11: 0000000000000206 R12: 00007fff86250170 [ 1613.505824] R13: 00007fff86250160 R14: 0000000000000000 R15: 00007fff86250170 03:50:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="8d5cbd1c496ae74a4ca4769762510ae32070e9af2fc5d4caa950efd0d4aeda1f60ce11586e44d8fb9c35293203cd2a6865a61be7016afe1d561f6e377d2962eec1b85700af684c8ad5a220e8cb835cda9ffd287b0211c1fb635a4dfc35cc59ba4eefc0dac0f3012f9c47f351c2de40f6a9523e769d7ac71fb52dbd72", 0xfffffd93}, {&(0x7f00000002c0)="4c2bafd9bb6f41643acd3379070dfedd0774844bc8bb12cde7196e09d0acac7b91e38c215c023c600d61d7f2ed27660fca895ee39e3cdbbae678f7264bfacfe9a7b07c903f688554a63336a4a6ab3fecb8aa7eaef4b296b4522a2c84fccb1ce91c59a43c71d24d12ca0a26463f4fdba9080743c13f435d015fe9a3a63c1bc243ee3f54e877fa53f49795376b6f7ec5c89513b0599a3780d4cf12929f", 0x19}], 0x2, 0x0, 0x0, 0x40000}, 0x0) recvmsg(r1, &(0x7f0000000c00)={0x0, 0xffffffffffffffe6, &(0x7f0000000b00)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 03:50:37 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1613.517146] Task in /syz2 killed as a result of limit of /syz2 [ 1613.523774] memory: usage 868kB, limit 0kB, failcnt 586742 [ 1613.530312] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1613.537930] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1613.544374] Memory cgroup stats for /syz2: cache:156KB rss:112KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB 03:50:37 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) [ 1613.564756] Memory cgroup out of memory: Kill process 31361 (syz-executor.2) score 8758000 or sacrifice child [ 1613.592322] Killed process 31361 (syz-executor.2) total-vm:72452kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 1613.604704] oom_reaper: reaped process 31361 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1613.695381] device lo entered promiscuous mode [ 1613.910602] device lo left promiscuous mode 03:50:37 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:37 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:37 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:50:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf78}], 0x1}}], 0x2, 0x0, 0x0) [ 1614.077353] device lo entered promiscuous mode 03:50:37 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1614.111401] device lo left promiscuous mode 03:50:37 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:37 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:50:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r2, 0x0, 0x60, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x44) 03:50:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r2 = semget$private(0x0, 0x4, 0x400) semctl$SEM_STAT(r2, 0x0, 0x12, 0x0) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000000c0)=""/49) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x40010002, 0x0) 03:50:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000e00aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1614.654348] protocol 88fb is buggy, dev hsr_slave_0 [ 1614.659649] protocol 88fb is buggy, dev hsr_slave_1 [ 1614.665203] protocol 88fb is buggy, dev hsr_slave_0 [ 1614.670399] protocol 88fb is buggy, dev hsr_slave_1 03:50:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1614.814711] protocol 88fb is buggy, dev hsr_slave_0 [ 1614.820409] protocol 88fb is buggy, dev hsr_slave_1 [ 1615.023370] device lo entered promiscuous mode [ 1615.029885] device lo left promiscuous mode 03:50:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf80}], 0x1}}], 0x2, 0x0, 0x0) 03:50:38 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000002800aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1616.532553] IPVS: ftp: loaded support on port[0] = 21 [ 1616.559436] device bridge_slave_1 left promiscuous mode [ 1616.565967] bridge0: port 2(bridge_slave_1) entered disabled state [ 1616.605332] device bridge_slave_0 left promiscuous mode [ 1616.611076] bridge0: port 1(bridge_slave_0) entered disabled state [ 1619.727018] device hsr_slave_1 left promiscuous mode [ 1619.789463] device hsr_slave_0 left promiscuous mode [ 1619.857711] team0 (unregistering): Port device team_slave_1 removed [ 1619.870546] team0 (unregistering): Port device team_slave_0 removed [ 1619.881964] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1619.948969] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1620.036170] bond0 (unregistering): Released all slaves [ 1620.149569] chnl_net:caif_netlink_parms(): no params data found [ 1620.185896] bridge0: port 1(bridge_slave_0) entered blocking state [ 1620.192339] bridge0: port 1(bridge_slave_0) entered disabled state [ 1620.200699] device bridge_slave_0 entered promiscuous mode [ 1620.208331] bridge0: port 2(bridge_slave_1) entered blocking state [ 1620.215024] bridge0: port 2(bridge_slave_1) entered disabled state [ 1620.222278] device bridge_slave_1 entered promiscuous mode [ 1620.241864] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1620.254562] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1620.274955] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1620.282397] team0: Port device team_slave_0 added [ 1620.288693] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1620.296149] team0: Port device team_slave_1 added [ 1620.301592] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1620.309279] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1620.357028] device hsr_slave_0 entered promiscuous mode [ 1620.394723] device hsr_slave_1 entered promiscuous mode [ 1620.455449] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1620.462580] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1620.529915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1620.536363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1620.543120] bridge0: port 1(bridge_slave_0) entered blocking state [ 1620.550681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1620.634875] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1620.646034] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1620.657463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1620.666875] bridge0: port 1(bridge_slave_0) entered disabled state [ 1620.674016] bridge0: port 2(bridge_slave_1) entered disabled state [ 1620.686997] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1620.693387] 8021q: adding VLAN 0 to HW filter on device team0 [ 1620.714412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1620.722383] bridge0: port 1(bridge_slave_0) entered blocking state [ 1620.728988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1620.749588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1620.758084] bridge0: port 2(bridge_slave_1) entered blocking state [ 1620.764596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1620.783672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1620.792247] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1620.822351] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1620.832362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1620.847442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1620.862410] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1620.871269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1620.900594] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1620.923898] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1621.085468] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1621.097862] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1621.103557] CPU: 1 PID: 31462 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1621.110519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1621.119894] Call Trace: [ 1621.122510] dump_stack+0x172/0x1f0 [ 1621.126196] dump_header+0x15e/0xa55 [ 1621.129941] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1621.135212] ? ___ratelimit+0x60/0x595 [ 1621.139125] ? do_raw_spin_unlock+0x57/0x270 [ 1621.143582] oom_kill_process.cold+0x10/0x6ef [ 1621.148346] out_of_memory+0x936/0x12d0 [ 1621.152372] ? oom_killer_disable+0x280/0x280 [ 1621.157005] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1621.162053] ? memcg_event_wake+0x230/0x230 [ 1621.166503] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1621.171653] ? cgroup_file_notify+0x140/0x1b0 [ 1621.176185] memory_max_write+0x169/0x300 [ 1621.180541] ? mem_cgroup_write+0x360/0x360 [ 1621.184909] ? mem_cgroup_write+0x360/0x360 [ 1621.189280] cgroup_file_write+0x241/0x790 [ 1621.193553] ? mem_cgroup_write+0x360/0x360 [ 1621.197923] ? kill_css+0x380/0x380 [ 1621.201590] ? kernfs_fop_write+0x235/0x480 [ 1621.205945] ? kill_css+0x380/0x380 [ 1621.209604] kernfs_fop_write+0x2b8/0x480 [ 1621.213789] __vfs_write+0x114/0x810 [ 1621.217627] ? kernfs_fop_open+0xd80/0xd80 [ 1621.221917] ? kernel_read+0x120/0x120 [ 1621.225834] ? __lock_is_held+0xb6/0x140 [ 1621.229939] ? rcu_read_lock_sched_held+0x110/0x130 [ 1621.234989] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1621.239781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1621.245349] ? __sb_start_write+0x1a9/0x360 [ 1621.249702] vfs_write+0x20c/0x560 [ 1621.253280] ksys_write+0x14f/0x2d0 [ 1621.256936] ? __ia32_sys_read+0xb0/0xb0 [ 1621.261047] __x64_sys_write+0x73/0xb0 [ 1621.265134] do_syscall_64+0xfd/0x620 [ 1621.269186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1621.274392] RIP: 0033:0x459a29 [ 1621.277610] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1621.296621] RSP: 002b:00007f5d89cb6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1621.304357] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1621.311767] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1621.319075] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1621.326365] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d89cb76d4 [ 1621.333654] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1621.350219] Task in /syz2 killed as a result of limit of /syz2 [ 1621.358586] memory: usage 3220kB, limit 0kB, failcnt 586743 [ 1621.365919] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1621.373176] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1621.382508] Memory cgroup stats for /syz2: cache:156KB rss:2140KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1621.406016] Memory cgroup out of memory: Kill process 31461 (syz-executor.2) score 9275000 or sacrifice child [ 1621.417536] Killed process 31461 (syz-executor.2) total-vm:72584kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB 03:50:45 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) 03:50:45 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:50:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='/\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f00000000c0)=""/141) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f00000002c0)=""/102) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:50:45 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000003000aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) 03:50:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf88}], 0x1}}], 0x2, 0x0, 0x0) [ 1621.432563] oom_reaper: reaped process 31461 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 1621.473778] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1621.519660] device lo entered promiscuous mode [ 1621.537989] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1621.549751] device lo left promiscuous mode [ 1621.552312] CPU: 0 PID: 31458 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1621.561071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1621.570443] Call Trace: [ 1621.573046] dump_stack+0x172/0x1f0 [ 1621.576687] dump_header+0x15e/0xa55 [ 1621.580414] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1621.585536] ? ___ratelimit+0x60/0x595 [ 1621.589443] ? do_raw_spin_unlock+0x57/0x270 [ 1621.593874] oom_kill_process.cold+0x10/0x6ef [ 1621.598383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1621.604014] ? task_will_free_mem+0x139/0x6e0 [ 1621.608535] out_of_memory+0x936/0x12d0 [ 1621.612621] ? lock_downgrade+0x810/0x810 [ 1621.616988] ? oom_killer_disable+0x280/0x280 [ 1621.621494] ? find_held_lock+0x35/0x130 [ 1621.625666] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1621.630713] ? memcg_event_wake+0x230/0x230 [ 1621.635055] ? do_raw_spin_unlock+0x57/0x270 [ 1621.639471] ? _raw_spin_unlock+0x2d/0x50 [ 1621.643652] try_charge+0xef7/0x1480 [ 1621.647377] ? find_held_lock+0x35/0x130 [ 1621.651452] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1621.656403] ? kasan_check_read+0x11/0x20 [ 1621.660565] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1621.665421] mem_cgroup_try_charge+0x259/0x6b0 03:50:45 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000803500aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1621.670021] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1621.674994] wp_page_copy+0x430/0x16a0 [ 1621.678896] ? pmd_pfn+0x1d0/0x1d0 [ 1621.682444] ? kasan_check_read+0x11/0x20 [ 1621.686613] ? do_raw_spin_unlock+0x57/0x270 [ 1621.691044] do_wp_page+0x57d/0x10b0 [ 1621.694777] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1621.699454] ? kasan_check_write+0x14/0x20 [ 1621.703697] ? do_raw_spin_lock+0xc8/0x240 [ 1621.707951] __handle_mm_fault+0x2305/0x3f80 [ 1621.712392] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1621.717399] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1621.722094] handle_mm_fault+0x1b5/0x690 [ 1621.726172] __do_page_fault+0x62a/0xe90 [ 1621.730246] ? vmalloc_fault+0x740/0x740 [ 1621.734401] ? trace_hardirqs_off_caller+0x65/0x220 [ 1621.739516] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1621.744722] ? page_fault+0x8/0x30 [ 1621.748289] do_page_fault+0x71/0x57d [ 1621.752241] ? page_fault+0x8/0x30 [ 1621.755886] page_fault+0x1e/0x30 [ 1621.759417] RIP: 0033:0x430b06 [ 1621.762682] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1621.781905] RSP: 002b:00007ffd9da548d0 EFLAGS: 00010206 [ 1621.787372] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1621.794843] RDX: 00005555566a6930 RSI: 00005555566ae970 RDI: 0000000000000003 [ 1621.802225] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555566a5940 [ 1621.810189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1621.817462] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1621.834026] Task in /syz2 killed as a result of limit of /syz2 [ 1621.840942] memory: usage 884kB, limit 0kB, failcnt 586755 [ 1621.852691] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1621.863502] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1621.892626] Memory cgroup stats for /syz2: cache:156KB rss:32KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB 03:50:45 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:45 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) [ 1621.954185] Memory cgroup out of memory: Kill process 31458 (syz-executor.2) score 8760000 or sacrifice child [ 1621.976724] Killed process 31458 (syz-executor.2) total-vm:72452kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB 03:50:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xb8000000, 0x2f}, [@ldst={0x7, 0xc0ffffff}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 1622.023792] device lo entered promiscuous mode [ 1622.057771] device lo left promiscuous mode [ 1622.069584] oom_reaper: reaped process 31458 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:50:45 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:45 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4) 03:50:46 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:46 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:50:46 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1622.298486] device lo entered promiscuous mode [ 1622.319583] syz-executor.3 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1622.341283] device lo left promiscuous mode [ 1622.383559] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 1622.409642] CPU: 1 PID: 31493 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 1622.416629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1622.426001] Call Trace: [ 1622.428616] dump_stack+0x172/0x1f0 [ 1622.432359] dump_header+0x15e/0xa55 [ 1622.436103] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1622.441520] ? ___ratelimit+0x60/0x595 [ 1622.445428] ? do_raw_spin_unlock+0x57/0x270 [ 1622.449888] oom_kill_process.cold+0x10/0x6ef [ 1622.454413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1622.459980] ? task_will_free_mem+0x139/0x6e0 [ 1622.464658] out_of_memory+0x936/0x12d0 [ 1622.468786] ? oom_killer_disable+0x280/0x280 [ 1622.473324] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1622.478200] ? memcg_event_wake+0x230/0x230 [ 1622.482554] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1622.487697] ? cgroup_file_notify+0x140/0x1b0 [ 1622.492396] memory_max_write+0x169/0x300 [ 1622.496577] ? __lock_is_held+0xb6/0x140 [ 1622.500674] ? mem_cgroup_write+0x360/0x360 [ 1622.505021] ? lock_acquire+0x16f/0x3f0 [ 1622.509020] ? kernfs_fop_write+0x227/0x480 [ 1622.513349] cgroup_file_write+0x241/0x790 [ 1622.517607] ? mem_cgroup_write+0x360/0x360 [ 1622.522054] ? kill_css+0x380/0x380 [ 1622.525712] ? kill_css+0x380/0x380 [ 1622.529378] kernfs_fop_write+0x2b8/0x480 [ 1622.533549] ? lock_downgrade+0x810/0x810 [ 1622.537722] __vfs_write+0x114/0x810 [ 1622.541673] ? kernfs_fop_open+0xd80/0xd80 [ 1622.546072] ? kernel_read+0x120/0x120 [ 1622.550130] ? kfree+0x170/0x220 [ 1622.553511] ? kvfree+0x61/0x70 [ 1622.556811] ? kfree+0x170/0x220 [ 1622.560189] ? __lock_is_held+0xb6/0x140 [ 1622.564268] __kernel_write+0x110/0x390 [ 1622.568297] write_pipe_buf+0x15d/0x1f0 [ 1622.572264] ? do_splice_direct+0x2a0/0x2a0 [ 1622.576585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1622.582200] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1622.587582] __splice_from_pipe+0x391/0x7d0 [ 1622.591892] ? do_splice_direct+0x2a0/0x2a0 [ 1622.596297] ? do_splice_direct+0x2a0/0x2a0 [ 1622.600616] splice_from_pipe+0x108/0x170 [ 1622.604764] ? splice_shrink_spd+0xd0/0xd0 [ 1622.609099] ? security_file_permission+0x89/0x230 [ 1622.614040] default_file_splice_write+0x3c/0x90 [ 1622.618832] ? generic_splice_sendpage+0x50/0x50 [ 1622.623723] direct_splice_actor+0x123/0x190 [ 1622.628137] splice_direct_to_actor+0x2e7/0x890 [ 1622.632817] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1622.637674] ? do_splice_to+0x180/0x180 [ 1622.641653] ? security_file_permission+0x89/0x230 [ 1622.646580] ? rw_verify_area+0x118/0x360 [ 1622.650893] do_splice_direct+0x1da/0x2a0 [ 1622.655151] ? splice_direct_to_actor+0x890/0x890 [ 1622.660136] ? rcu_read_lock_sched_held+0x110/0x130 [ 1622.668965] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1622.673719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1622.679386] ? __sb_start_write+0x1a9/0x360 [ 1622.683706] do_sendfile+0x597/0xce0 [ 1622.687456] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1622.692157] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1622.697751] ? put_timespec64+0xda/0x140 [ 1622.701817] __x64_sys_sendfile64+0x1dd/0x220 [ 1622.706323] ? __ia32_sys_sendfile+0x230/0x230 [ 1622.710907] ? do_syscall_64+0x26/0x620 [ 1622.714958] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1622.719548] ? trace_hardirqs_on+0x67/0x220 [ 1622.724015] do_syscall_64+0xfd/0x620 [ 1622.727984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1622.733182] RIP: 0033:0x459a29 [ 1622.736376] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1622.755273] RSP: 002b:00007fde0507dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1622.762976] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a29 [ 1622.770251] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 1622.777509] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:50:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x796bf9fc749681ee) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffd76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0x7fff}}, 0x0, 0xfffffffffffffffc, r2, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:50:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf90}], 0x1}}], 0x2, 0x0, 0x0) 03:50:46 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:46 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1622.784788] R10: 0000000000000004 R11: 0000000000000246 R12: 00007fde0507e6d4 [ 1622.792057] R13: 00000000004c721c R14: 00000000004dca50 R15: 00000000ffffffff [ 1622.805311] Task in /syz3 killed as a result of limit of /syz3 [ 1622.813965] memory: usage 8224kB, limit 8kB, failcnt 140 [ 1622.822293] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 03:50:46 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @remote}, 0x1ec) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r2, 0x1, 0x6, @remote}, 0x10) [ 1622.859821] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1622.878469] Memory cgroup stats for /syz3: cache:0KB rss:4196KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4368KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1622.943714] Memory cgroup out of memory: Kill process 31442 (syz-executor.3) score 4766000 or sacrifice child [ 1622.955726] Killed process 31442 (syz-executor.3) total-vm:72712kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 1622.969076] oom_reaper: reaped process 31442 (syz-executor.3), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 1622.986979] syz-executor.3 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 03:50:46 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @remote}, 0x1ec) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r2, 0x1, 0x6, @remote}, 0x10) 03:50:46 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1623.024670] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 1623.066685] CPU: 1 PID: 31493 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 1623.073696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.083092] Call Trace: [ 1623.085699] dump_stack+0x172/0x1f0 [ 1623.089366] dump_header+0x15e/0xa55 [ 1623.093103] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1623.098580] ? ___ratelimit+0x60/0x595 [ 1623.102490] ? do_raw_spin_unlock+0x57/0x270 [ 1623.106925] oom_kill_process.cold+0x10/0x6ef [ 1623.111455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1623.117023] ? task_will_free_mem+0x139/0x6e0 [ 1623.121553] out_of_memory+0x936/0x12d0 [ 1623.125554] ? oom_killer_disable+0x280/0x280 [ 1623.130072] ? cgroup_file_notify+0x140/0x1b0 [ 1623.134636] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1623.139506] ? memcg_event_wake+0x230/0x230 [ 1623.143869] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1623.149001] ? cgroup_file_notify+0x140/0x1b0 [ 1623.153531] memory_max_write+0x169/0x300 [ 1623.157716] ? __lock_is_held+0xb6/0x140 [ 1623.161802] ? mem_cgroup_write+0x360/0x360 [ 1623.166155] ? lock_acquire+0x16f/0x3f0 [ 1623.170328] ? kernfs_fop_write+0x227/0x480 [ 1623.174765] cgroup_file_write+0x241/0x790 [ 1623.179026] ? mem_cgroup_write+0x360/0x360 [ 1623.183364] ? kill_css+0x380/0x380 [ 1623.187009] ? kill_css+0x380/0x380 [ 1623.190632] kernfs_fop_write+0x2b8/0x480 [ 1623.195058] ? lock_downgrade+0x810/0x810 [ 1623.199215] __vfs_write+0x114/0x810 [ 1623.203035] ? kernfs_fop_open+0xd80/0xd80 [ 1623.207271] ? kernel_read+0x120/0x120 [ 1623.211164] ? kfree+0x170/0x220 [ 1623.214532] ? kvfree+0x61/0x70 [ 1623.217801] ? kfree+0x170/0x220 [ 1623.221178] ? __lock_is_held+0xb6/0x140 [ 1623.225250] __kernel_write+0x110/0x390 [ 1623.229320] write_pipe_buf+0x15d/0x1f0 [ 1623.233546] ? do_splice_direct+0x2a0/0x2a0 [ 1623.237875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1623.243579] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1623.248946] __splice_from_pipe+0x391/0x7d0 [ 1623.253262] ? do_splice_direct+0x2a0/0x2a0 [ 1623.257600] ? do_splice_direct+0x2a0/0x2a0 [ 1623.261916] splice_from_pipe+0x108/0x170 [ 1623.266169] ? splice_shrink_spd+0xd0/0xd0 [ 1623.270417] ? security_file_permission+0x89/0x230 [ 1623.275346] default_file_splice_write+0x3c/0x90 [ 1623.280105] ? generic_splice_sendpage+0x50/0x50 [ 1623.284943] direct_splice_actor+0x123/0x190 [ 1623.289349] splice_direct_to_actor+0x2e7/0x890 [ 1623.294011] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1623.299193] ? do_splice_to+0x180/0x180 [ 1623.303165] ? security_file_permission+0x89/0x230 [ 1623.308089] ? rw_verify_area+0x118/0x360 [ 1623.312236] do_splice_direct+0x1da/0x2a0 [ 1623.316377] ? splice_direct_to_actor+0x890/0x890 [ 1623.321213] ? rcu_read_lock_sched_held+0x110/0x130 [ 1623.326234] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1623.330984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1623.336533] ? __sb_start_write+0x1a9/0x360 [ 1623.340865] do_sendfile+0x597/0xce0 [ 1623.344579] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1623.349155] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1623.354684] ? put_timespec64+0xda/0x140 [ 1623.358746] __x64_sys_sendfile64+0x1dd/0x220 [ 1623.363236] ? __ia32_sys_sendfile+0x230/0x230 [ 1623.367821] ? do_syscall_64+0x26/0x620 [ 1623.371788] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1623.376363] ? trace_hardirqs_on+0x67/0x220 [ 1623.380681] do_syscall_64+0xfd/0x620 [ 1623.384479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1623.389666] RIP: 0033:0x459a29 [ 1623.392853] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1623.411923] RSP: 002b:00007fde0507dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1623.419625] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a29 [ 1623.426888] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 1623.434146] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1623.441538] R10: 0000000000000004 R11: 0000000000000246 R12: 00007fde0507e6d4 [ 1623.448800] R13: 00000000004c721c R14: 00000000004dca50 R15: 00000000ffffffff 03:50:47 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1623.716649] Task in /syz3 killed as a result of limit of /syz3 [ 1623.722905] memory: usage 5876kB, limit 8kB, failcnt 148 [ 1623.729194] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1623.737838] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1623.766105] Memory cgroup stats for /syz3: cache:0KB rss:2120KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2192KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1623.814398] Memory cgroup out of memory: Kill process 31490 (syz-executor.3) score 4637000 or sacrifice child [ 1623.834555] Killed process 31490 (syz-executor.3) total-vm:72712kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB 03:50:47 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1623.862397] oom_reaper: reaped process 31490 (syz-executor.3), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 03:50:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x4, 0x4) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 03:50:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000180)) r2 = accept$alg(r0, 0x0, 0x0) write(r2, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r4 = openat$cgroup_ro(r3, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x8200) 03:50:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xf98}], 0x1}}], 0x2, 0x0, 0x0) 03:50:47 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @remote}, 0x1ec) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r2, 0x1, 0x6, @remote}, 0x10) 03:50:47 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1624.335440] device bridge_slave_1 left promiscuous mode [ 1624.341279] bridge0: port 2(bridge_slave_1) entered disabled state [ 1624.395415] device bridge_slave_0 left promiscuous mode [ 1624.400969] bridge0: port 1(bridge_slave_0) entered disabled state [ 1624.598194] device hsr_slave_1 left promiscuous mode [ 1624.639610] device hsr_slave_0 left promiscuous mode [ 1624.699067] team0 (unregistering): Port device team_slave_1 removed [ 1624.731623] team0 (unregistering): Port device team_slave_0 removed [ 1624.773314] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1624.842306] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1625.016126] bond0 (unregistering): Released all slaves [ 1625.541974] IPVS: ftp: loaded support on port[0] = 21 [ 1625.805238] chnl_net:caif_netlink_parms(): no params data found [ 1625.930068] bridge0: port 1(bridge_slave_0) entered blocking state [ 1625.959699] bridge0: port 1(bridge_slave_0) entered disabled state [ 1625.980860] device bridge_slave_0 entered promiscuous mode [ 1626.001571] bridge0: port 2(bridge_slave_1) entered blocking state [ 1626.020588] bridge0: port 2(bridge_slave_1) entered disabled state [ 1626.041062] device bridge_slave_1 entered promiscuous mode [ 1626.089343] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1626.104691] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1626.147014] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1626.175445] team0: Port device team_slave_0 added [ 1626.181337] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1626.205287] team0: Port device team_slave_1 added [ 1626.211534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1626.235031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1626.327291] device hsr_slave_0 entered promiscuous mode [ 1626.370159] device hsr_slave_1 entered promiscuous mode [ 1626.414943] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1626.422738] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1626.476635] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1626.602617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1626.632359] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1626.659482] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1626.678261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1626.697043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1626.719098] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1626.736215] 8021q: adding VLAN 0 to HW filter on device team0 [ 1626.759754] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1626.781288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1626.808732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1626.828518] bridge0: port 1(bridge_slave_0) entered blocking state [ 1626.834973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1626.849016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1626.860118] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1626.889028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1626.902205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1626.924941] bridge0: port 2(bridge_slave_1) entered blocking state [ 1626.935937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1626.959010] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1626.974583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1626.987135] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1626.994342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1627.018865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1627.034857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1627.042513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1627.075559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1627.104664] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1627.132351] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1627.147335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1627.155153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1627.195632] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1627.234771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1627.362791] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1627.380655] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1627.387053] CPU: 0 PID: 31551 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1627.394000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1627.403376] Call Trace: [ 1627.405980] dump_stack+0x172/0x1f0 [ 1627.409630] dump_header+0x15e/0xa55 [ 1627.413355] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1627.418530] ? ___ratelimit+0x60/0x595 [ 1627.422526] ? do_raw_spin_unlock+0x57/0x270 [ 1627.426953] oom_kill_process.cold+0x10/0x6ef [ 1627.431471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1627.437019] ? task_will_free_mem+0x139/0x6e0 [ 1627.441538] out_of_memory+0x936/0x12d0 [ 1627.445663] ? oom_killer_disable+0x280/0x280 [ 1627.450406] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1627.455251] ? memcg_event_wake+0x230/0x230 [ 1627.459578] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1627.464685] ? cgroup_file_notify+0x140/0x1b0 [ 1627.469214] memory_max_write+0x169/0x300 [ 1627.473367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1627.478126] ? mem_cgroup_write+0x360/0x360 [ 1627.482448] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1627.487204] cgroup_file_write+0x241/0x790 [ 1627.491594] ? mem_cgroup_write+0x360/0x360 [ 1627.495939] ? kill_css+0x380/0x380 [ 1627.499563] ? kill_css+0x380/0x380 [ 1627.503185] kernfs_fop_write+0x2b8/0x480 [ 1627.507333] __vfs_write+0x114/0x810 [ 1627.511040] ? kernfs_fop_open+0xd80/0xd80 [ 1627.515271] ? kernel_read+0x120/0x120 [ 1627.519170] ? __lock_is_held+0xb6/0x140 [ 1627.523239] ? rcu_read_lock_sched_held+0x110/0x130 [ 1627.528246] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1627.532997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1627.538541] ? __sb_start_write+0x1a9/0x360 [ 1627.542875] vfs_write+0x20c/0x560 [ 1627.546423] ksys_write+0x14f/0x2d0 [ 1627.550046] ? __ia32_sys_read+0xb0/0xb0 [ 1627.554137] ? do_syscall_64+0x26/0x620 [ 1627.558104] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.563464] ? do_syscall_64+0x26/0x620 [ 1627.567457] __x64_sys_write+0x73/0xb0 [ 1627.571370] do_syscall_64+0xfd/0x620 [ 1627.575182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.580403] RIP: 0033:0x459a29 [ 1627.583586] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1627.602548] RSP: 002b:00007fca407bac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1627.610378] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1627.617655] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1627.625166] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1627.632439] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca407bb6d4 [ 1627.639813] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1627.660852] Task in /syz2 killed as a result of limit of /syz2 [ 1627.667628] memory: usage 3280kB, limit 0kB, failcnt 586756 [ 1627.673682] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1627.682317] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1627.689280] Memory cgroup stats for /syz2: cache:156KB rss:2144KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2172KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1627.714178] Memory cgroup out of memory: Kill process 31550 (syz-executor.2) score 9274000 or sacrifice child [ 1627.725256] Killed process 31550 (syz-executor.2) total-vm:72584kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 1627.739634] oom_reaper: reaped process 31550 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 03:50:51 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:50:51 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r0, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r0, 0x1, 0x6, @remote}, 0x1ec) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={r2, 0x1, 0x6, @remote}, 0x10) 03:50:51 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:50:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xfa0}], 0x1}}], 0x2, 0x0, 0x0) 03:50:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") getsockopt$inet_buf(r2, 0x0, 0x2b, &(0x7f00000000c0)=""/185, &(0x7f0000000180)=0xb9) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1627.985861] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1628.003612] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1628.011229] CPU: 1 PID: 31547 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1628.018298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1628.027749] Call Trace: [ 1628.030348] dump_stack+0x172/0x1f0 [ 1628.034011] dump_header+0x15e/0xa55 [ 1628.037788] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1628.042908] ? ___ratelimit+0x60/0x595 [ 1628.046810] ? do_raw_spin_unlock+0x57/0x270 [ 1628.051227] oom_kill_process.cold+0x10/0x6ef [ 1628.055822] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1628.061358] ? task_will_free_mem+0x139/0x6e0 [ 1628.065859] out_of_memory+0x936/0x12d0 [ 1628.070030] ? lock_downgrade+0x810/0x810 [ 1628.074203] ? oom_killer_disable+0x280/0x280 [ 1628.078711] ? find_held_lock+0x35/0x130 [ 1628.082798] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1628.087658] ? memcg_event_wake+0x230/0x230 [ 1628.092089] ? do_raw_spin_unlock+0x57/0x270 [ 1628.096517] ? _raw_spin_unlock+0x2d/0x50 [ 1628.100677] try_charge+0xef7/0x1480 [ 1628.104400] ? find_held_lock+0x35/0x130 [ 1628.108473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1628.113330] ? kasan_check_read+0x11/0x20 [ 1628.117501] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1628.122354] mem_cgroup_try_charge+0x259/0x6b0 [ 1628.126958] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1628.132030] wp_page_copy+0x430/0x16a0 [ 1628.135946] ? pmd_pfn+0x1d0/0x1d0 [ 1628.139498] ? kasan_check_read+0x11/0x20 [ 1628.143762] ? do_raw_spin_unlock+0x57/0x270 [ 1628.148167] do_wp_page+0x57d/0x10b0 [ 1628.151876] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1628.156544] ? kasan_check_write+0x14/0x20 [ 1628.160774] ? do_raw_spin_lock+0xc8/0x240 [ 1628.165020] __handle_mm_fault+0x2305/0x3f80 [ 1628.169446] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1628.174290] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1628.178959] handle_mm_fault+0x1b5/0x690 [ 1628.183045] __do_page_fault+0x62a/0xe90 [ 1628.187098] ? vmalloc_fault+0x740/0x740 [ 1628.191158] ? trace_hardirqs_off_caller+0x65/0x220 [ 1628.196275] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1628.201212] ? page_fault+0x8/0x30 [ 1628.204839] do_page_fault+0x71/0x57d [ 1628.208735] ? page_fault+0x8/0x30 [ 1628.212640] page_fault+0x1e/0x30 [ 1628.216257] RIP: 0033:0x430b06 03:50:52 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1628.219452] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1628.238521] RSP: 002b:00007ffe4f3ff750 EFLAGS: 00010206 [ 1628.243878] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1628.251262] RDX: 0000555555bc3930 RSI: 0000555555bcb970 RDI: 0000000000000003 [ 1628.258531] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555bc2940 [ 1628.265805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1628.273497] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1628.288149] Task in /syz2 killed as a result of limit of /syz2 [ 1628.294507] memory: usage 940kB, limit 0kB, failcnt 586764 [ 1628.300266] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1628.307155] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1628.313319] Memory cgroup stats for /syz2: cache:156KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB 03:50:52 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r0, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r0, 0x1, 0x6, @remote}, 0x1ec) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={r2, 0x1, 0x6, @remote}, 0x10) [ 1628.334183] Memory cgroup out of memory: Kill process 31547 (syz-executor.2) score 8759000 or sacrifice child [ 1628.348214] Killed process 31547 (syz-executor.2) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 1628.360477] oom_reaper: reaped process 31547 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1629.065454] device bridge_slave_1 left promiscuous mode [ 1629.071104] bridge0: port 2(bridge_slave_1) entered disabled state [ 1629.125337] device bridge_slave_0 left promiscuous mode [ 1629.130899] bridge0: port 1(bridge_slave_0) entered disabled state [ 1629.289076] device hsr_slave_1 left promiscuous mode [ 1629.349128] device hsr_slave_0 left promiscuous mode [ 1629.408866] team0 (unregistering): Port device team_slave_1 removed [ 1629.447697] team0 (unregistering): Port device team_slave_0 removed [ 1629.473468] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1629.532444] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1629.707226] bond0 (unregistering): Released all slaves 03:51:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x8000, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000080)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r2, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) socket$netlink(0x10, 0x3, 0xc) syncfs(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) 03:51:47 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r0, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r0, 0x1, 0x6, @remote}, 0x1ec) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={r2, 0x1, 0x6, @remote}, 0x10) 03:51:47 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:51:47 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:51:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xfa8}], 0x1}}], 0x2, 0x0, 0x0) 03:51:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x400) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f00000001c0)={0x90, 0x20, &(0x7f0000000140)="de11b9851d2e4a11dcd5a24bd75166d0ff30bea9894d566d9297aabf8f7be9224b9fd1b92e8768b1afb2249573863f108aa1aee1046152bdf82b9a6dd79f7036f4f3defd0d425689ce318dbd31b0810257adee097c2bc7df493715e1b239d54bafa8", {0xffffffda, 0x2, 0x32315559, 0x2, 0x3, 0x1, 0x0, 0xe3}}) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x2ce}}], 0x1, 0x0, 0x0) 03:51:47 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:51:47 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:51:48 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:51:48 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:51:48 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:51:48 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe800000000000000000000000b200aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1684.610412] device bridge_slave_1 left promiscuous mode [ 1684.616216] bridge0: port 2(bridge_slave_1) entered disabled state [ 1684.675334] device bridge_slave_0 left promiscuous mode [ 1684.682218] bridge0: port 1(bridge_slave_0) entered disabled state [ 1684.832955] device hsr_slave_1 left promiscuous mode [ 1684.893056] device hsr_slave_0 left promiscuous mode [ 1684.940182] team0 (unregistering): Port device team_slave_1 removed [ 1684.982606] team0 (unregistering): Port device team_slave_0 removed [ 1685.038577] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1685.101453] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1685.233969] bond0 (unregistering): Released all slaves [ 1686.058643] IPVS: ftp: loaded support on port[0] = 21 [ 1686.217491] chnl_net:caif_netlink_parms(): no params data found [ 1686.276022] bridge0: port 1(bridge_slave_0) entered blocking state [ 1686.282517] bridge0: port 1(bridge_slave_0) entered disabled state [ 1686.290063] device bridge_slave_0 entered promiscuous mode [ 1686.297592] bridge0: port 2(bridge_slave_1) entered blocking state [ 1686.304162] bridge0: port 2(bridge_slave_1) entered disabled state [ 1686.312391] device bridge_slave_1 entered promiscuous mode [ 1686.334066] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1686.343640] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1686.369268] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1686.377032] team0: Port device team_slave_0 added [ 1686.382956] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1686.390712] team0: Port device team_slave_1 added [ 1686.396281] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1686.403892] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1686.467369] device hsr_slave_0 entered promiscuous mode [ 1686.509490] device hsr_slave_1 entered promiscuous mode [ 1686.555309] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1686.562665] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1686.578758] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1686.621966] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1686.630066] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1686.640638] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1686.650815] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1686.657875] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1686.670299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1686.685200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1686.695217] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1686.701602] 8021q: adding VLAN 0 to HW filter on device team0 [ 1686.735083] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1686.755419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1686.763411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1686.771503] bridge0: port 1(bridge_slave_0) entered blocking state [ 1686.778122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1686.787920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1686.800207] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1686.808052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1686.816219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1686.824004] bridge0: port 2(bridge_slave_1) entered blocking state [ 1686.830503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1686.849899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1686.858681] IPVS: ftp: loaded support on port[0] = 21 [ 1686.858763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1686.872852] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1686.898785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1686.907833] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1686.917960] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1686.924221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1686.991070] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1687.003888] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1687.014885] chnl_net:caif_netlink_parms(): no params data found [ 1687.109943] bridge0: port 1(bridge_slave_0) entered blocking state [ 1687.122761] bridge0: port 1(bridge_slave_0) entered disabled state [ 1687.132254] device bridge_slave_0 entered promiscuous mode [ 1687.148304] bridge0: port 2(bridge_slave_1) entered blocking state [ 1687.161166] bridge0: port 2(bridge_slave_1) entered disabled state [ 1687.169378] device bridge_slave_1 entered promiscuous mode [ 1687.212248] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1687.230422] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1687.284690] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1687.293343] team0: Port device team_slave_0 added [ 1687.300821] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1687.308481] team0: Port device team_slave_1 added [ 1687.313983] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1687.330277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 03:51:51 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@assoc={0x18, 0x29}], 0xf}], 0x3bb, 0x0) 03:51:51 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:51:51 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe800000000000000000000003e800aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1687.396751] device hsr_slave_0 entered promiscuous mode [ 1687.424939] device hsr_slave_1 entered promiscuous mode [ 1687.485193] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1687.492513] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1687.551995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1687.659607] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1687.673811] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1687.684004] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1687.692153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1687.700050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1687.710026] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1687.716757] 8021q: adding VLAN 0 to HW filter on device team0 [ 1687.726847] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1687.734912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1687.742956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1687.752865] bridge0: port 1(bridge_slave_0) entered blocking state [ 1687.759306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1687.769564] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1687.777250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1687.785214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1687.793248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1687.801344] bridge0: port 2(bridge_slave_1) entered blocking state [ 1687.807884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1687.820363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1687.828193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1687.839197] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1687.846670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1687.858949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1687.866614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1687.875097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1687.883528] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1687.893417] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1687.900707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1687.909620] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1687.923069] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1687.933440] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1687.944147] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1687.950925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1687.959026] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1687.967117] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1687.985705] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1688.000481] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1688.112190] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1688.125704] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 1688.131812] CPU: 1 PID: 31626 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1688.138765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.148219] Call Trace: [ 1688.150931] dump_stack+0x172/0x1f0 [ 1688.154707] dump_header+0x15e/0xa55 [ 1688.158542] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1688.163668] ? ___ratelimit+0x60/0x595 [ 1688.167572] ? do_raw_spin_unlock+0x57/0x270 [ 1688.172109] oom_kill_process.cold+0x10/0x6ef [ 1688.176626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1688.182198] ? task_will_free_mem+0x139/0x6e0 [ 1688.186705] out_of_memory+0x936/0x12d0 [ 1688.190705] ? oom_killer_disable+0x280/0x280 [ 1688.195225] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1688.200081] ? memcg_event_wake+0x230/0x230 [ 1688.204667] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1688.209763] ? cgroup_file_notify+0x140/0x1b0 [ 1688.214266] memory_max_write+0x169/0x300 [ 1688.218425] ? mem_cgroup_write+0x360/0x360 [ 1688.222744] cgroup_file_write+0x241/0x790 [ 1688.226991] ? mem_cgroup_write+0x360/0x360 [ 1688.231415] ? kill_css+0x380/0x380 [ 1688.235047] ? lock_is_held_type+0x17e/0x210 [ 1688.239473] ? kill_css+0x380/0x380 [ 1688.243099] kernfs_fop_write+0x2b8/0x480 [ 1688.247336] __vfs_write+0x114/0x810 [ 1688.251041] ? kernfs_fop_open+0xd80/0xd80 [ 1688.255700] ? kernel_read+0x120/0x120 [ 1688.259585] ? __lock_is_held+0xb6/0x140 [ 1688.263744] ? rcu_read_lock_sched_held+0x110/0x130 [ 1688.268752] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1688.273498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1688.279122] ? __sb_start_write+0x1a9/0x360 [ 1688.283444] vfs_write+0x20c/0x560 [ 1688.287000] ksys_write+0x14f/0x2d0 [ 1688.290654] ? __ia32_sys_read+0xb0/0xb0 [ 1688.294726] ? do_syscall_64+0x26/0x620 [ 1688.298690] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1688.304039] ? do_syscall_64+0x26/0x620 [ 1688.308009] __x64_sys_write+0x73/0xb0 [ 1688.311885] do_syscall_64+0xfd/0x620 [ 1688.315678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1688.320865] RIP: 0033:0x459a29 [ 1688.324051] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1688.342949] RSP: 002b:00007f89ad747c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1688.350747] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1688.358012] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1688.365270] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1688.372540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f89ad7486d4 [ 1688.379887] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 1688.401383] Task in /syz2 killed as a result of limit of /syz2 [ 1688.408328] memory: usage 3236kB, limit 0kB, failcnt 586765 [ 1688.414504] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1688.421526] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1688.428642] Memory cgroup stats for /syz2: cache:156KB rss:2204KB rss_huge:2048KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1688.451121] Memory cgroup out of memory: Kill process 31625 (syz-executor.2) score 9272000 or sacrifice child [ 1688.464201] Killed process 31625 (syz-executor.2) total-vm:72584kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 1688.478773] oom_reaper: reaped process 31625 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 03:51:52 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 03:51:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f00000000c0)="00286eb4fa920000000000000000", 0xfffffffffffffc95) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:51:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0xfb0}], 0x1}}], 0x2, 0x0, 0x0) 03:51:52 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:51:52 executing program 5: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x1ec) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @remote}, 0x10) 03:51:52 executing program 3: socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4000000000001b9, 0x0) r0 = socket(0x10, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1688.508645] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1688.522037] syz-executor.2 cpuset=syz2 mems_allowed=0-1 03:51:52 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:51:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresuid(0xee00, 0xee01, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x1110002, 0xffffffffffffffff}}}, 0x90) [ 1688.564740] CPU: 1 PID: 31607 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 1688.571905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.581445] Call Trace: [ 1688.584046] dump_stack+0x172/0x1f0 [ 1688.587754] dump_header+0x15e/0xa55 [ 1688.591531] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1688.596773] ? ___ratelimit+0x60/0x595 [ 1688.600684] ? do_raw_spin_unlock+0x57/0x270 [ 1688.605149] oom_kill_process.cold+0x10/0x6ef [ 1688.609672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:51:52 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1688.615230] ? task_will_free_mem+0x139/0x6e0 [ 1688.619763] out_of_memory+0x936/0x12d0 [ 1688.623848] ? lock_downgrade+0x810/0x810 [ 1688.628023] ? oom_killer_disable+0x280/0x280 [ 1688.632623] ? find_held_lock+0x35/0x130 [ 1688.636715] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1688.641668] ? memcg_event_wake+0x230/0x230 [ 1688.646344] ? do_raw_spin_unlock+0x57/0x270 [ 1688.650774] ? _raw_spin_unlock+0x2d/0x50 [ 1688.654957] try_charge+0xef7/0x1480 [ 1688.658694] ? find_held_lock+0x35/0x130 03:51:52 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000200aa00004e2000089078a756dbfaef1b7750716cce3b4d8815f0e6bbdf2caa6c9fe965b5d565b9ed73d06ab85d3551f5fcb2354e416a1b8ff94578ae664c19015a5184204147177b3a7ae5b022a1ed22c09f4132e2604cafacc0d4b0c240e1ea08fecc0dab2a4f42f3e063c30338098f4bdbacfd5ddd26f9de8fb22882e54bb14928c24e97b7edcf0e7bab30b1830ccd9aa11ac765e509b3fc8979f96e92c5eec700f9863c4264a566b154c38af5701ad39ae03c6f86a2fbcd41c1f54ccc3cc44a5fce75a80265aed1"], 0x0) [ 1688.662783] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1688.667649] ? kasan_check_read+0x11/0x20 [ 1688.671828] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1688.676691] mem_cgroup_try_charge+0x259/0x6b0 [ 1688.681381] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1688.686324] wp_page_copy+0x430/0x16a0 [ 1688.690231] ? mark_held_locks+0xb1/0x100 [ 1688.694487] ? pmd_pfn+0x1d0/0x1d0 [ 1688.698063] ? kasan_check_read+0x11/0x20 [ 1688.702235] ? do_raw_spin_unlock+0x57/0x270 [ 1688.706776] do_wp_page+0x57d/0x10b0 [ 1688.710515] ? finish_mkwrite_fault+0x4f0/0x4f0 03:51:52 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1688.715201] ? kasan_check_write+0x14/0x20 [ 1688.719446] ? do_raw_spin_lock+0xc8/0x240 [ 1688.723746] __handle_mm_fault+0x2305/0x3f80 [ 1688.728204] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1688.733104] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1688.737817] handle_mm_fault+0x1b5/0x690 [ 1688.741924] __do_page_fault+0x62a/0xe90 [ 1688.746015] ? vmalloc_fault+0x740/0x740 [ 1688.750104] ? trace_hardirqs_off_caller+0x65/0x220 [ 1688.755325] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1688.760454] ? page_fault+0x8/0x30 03:51:52 executing program 1: syz_emit_ethernet(0xc0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1688.764013] do_page_fault+0x71/0x57d [ 1688.767832] ? page_fault+0x8/0x30 [ 1688.771384] page_fault+0x1e/0x30 [ 1688.774855] RIP: 0033:0x430b06 [ 1688.778058] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 44 64 00 85 c0 0f 84 [ 1688.797061] RSP: 002b:00007fff70179310 EFLAGS: 00010206 [ 1688.802564] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 1688.809946] RDX: 00005555574eb930 RSI: 00005555574f3970 RDI: 0000000000000003 [ 1688.817233] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555574ea940 [ 1688.824519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 1688.831914] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 1688.840046] Task in /syz2 killed as a result of limit of /syz2 [ 1688.840089] memory: usage 904kB, limit 0kB, failcnt 586773 [ 1688.840098] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1688.840107] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1688.840114] Memory cgroup stats for /syz2: cache:156KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1688.840776] Memory cgroup out of memory: Kill process 31607 (syz-executor.2) score 8757000 or sacrifice child [ 1688.901290] ucma_write: process 12 (syz-executor.3) changed security contexts after opening file descriptor, this is not allowed. [ 1688.914160] Killed process 31607 (syz-executor.2) total-vm:72452kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 1688.925773] oom_reaper: reaped process 31607 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1688.956084] ------------[ cut here ]------------ [ 1688.962758] ODEBUG: free active (active state 1) object type: rcu_head hint: (null) [ 1688.971739] WARNING: CPU: 1 PID: 31642 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 [ 1688.980607] Kernel panic - not syncing: panic_on_warn set ... [ 1688.980607] [ 1688.988165] CPU: 1 PID: 31642 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 1688.989235] kobject: 'loop5' (00000000b55f3358): kobject_uevent_env [ 1688.995092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.995096] Call Trace: [ 1688.995118] dump_stack+0x172/0x1f0 [ 1688.995132] panic+0x263/0x507 [ 1688.995144] ? __warn_printk+0xf3/0xf3 [ 1688.995166] ? debug_print_object+0x168/0x250 [ 1689.003818] kobject: 'loop5' (00000000b55f3358): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1689.010914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.010928] ? __warn.cold+0x5/0x4a [ 1689.010944] ? debug_print_object+0x168/0x250 [ 1689.010958] __warn.cold+0x20/0x4a [ 1689.055957] ? trace_hardirqs_off+0x62/0x220 [ 1689.060480] ? debug_print_object+0x168/0x250 [ 1689.065083] report_bug+0x263/0x2b0 [ 1689.068883] do_error_trap+0x204/0x360 [ 1689.072878] ? math_error+0x340/0x340 [ 1689.076753] ? wake_up_klogd+0x99/0xd0 [ 1689.081186] ? vprintk_emit+0x1ab/0x690 [ 1689.085168] ? error_entry+0x7c/0xe0 [ 1689.088878] ? trace_hardirqs_off_caller+0x65/0x220 [ 1689.093910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1689.098764] do_invalid_op+0x1b/0x20 [ 1689.102482] invalid_op+0x14/0x20 [ 1689.105926] RIP: 0010:debug_print_object+0x168/0x250 [ 1689.111101] Code: dd 20 56 82 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 20 56 82 87 48 c7 c7 60 4b 82 87 e8 d6 04 19 fe <0f> 0b 83 05 cb 83 17 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 1689.129992] RSP: 0018:ffff888095b5f6f8 EFLAGS: 00010086 [ 1689.135342] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 1689.142609] RDX: 000000000003f32f RSI: ffffffff8155dbd6 RDI: ffffed1012b6bed1 [ 1689.149873] RBP: ffff888095b5f738 R08: ffff88804d0d8340 R09: ffffed1015d23ee3 [ 1689.157142] R10: ffffed1015d23ee2 R11: ffff8880ae91f717 R12: 0000000000000001 [ 1689.164593] R13: ffffffff8879f200 R14: 0000000000000000 R15: ffff8880525d35e0 [ 1689.172318] ? vprintk_func+0x86/0x189 [ 1689.176195] ? debug_print_object+0x168/0x250 [ 1689.180824] debug_check_no_obj_freed+0x29f/0x464 [ 1689.185699] kmem_cache_free+0x18f/0x260 [ 1689.189816] free_task+0xdd/0x120 [ 1689.193259] __put_task_struct+0x20f/0x4c0 [ 1689.197486] finish_task_switch+0x52b/0x780 [ 1689.201807] ? switch_mm_irqs_off+0x7fa/0x1360 [ 1689.206387] __schedule+0x86e/0x1dc0 [ 1689.210096] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1689.215186] ? lock_downgrade+0x810/0x810 [ 1689.219324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.224854] ? get_futex_value_locked+0xd6/0x100 [ 1689.229694] schedule+0x92/0x1c0 [ 1689.233161] futex_wait_queue_me+0x30c/0x600 [ 1689.237668] ? handle_futex_death.part.0+0x250/0x250 [ 1689.242883] ? lock_pi_update_atomic+0x120/0x120 [ 1689.247644] futex_wait+0x228/0x5e0 [ 1689.251264] ? futex_wait_setup+0x390/0x390 [ 1689.255669] ? kasan_check_read+0x11/0x20 [ 1689.259828] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1689.265120] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 1689.270156] ? futex_wake+0x179/0x4d0 [ 1689.274076] do_futex+0x175/0x1d70 [ 1689.277830] ? __might_fault+0x12b/0x1e0 [ 1689.281989] ? exit_robust_list+0x2c0/0x2c0 [ 1689.286425] ? kasan_check_read+0x11/0x20 [ 1689.290566] ? _copy_to_user+0xc9/0x120 [ 1689.294542] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1689.300099] __x64_sys_futex+0x400/0x590 [ 1689.304166] ? do_futex+0x1d70/0x1d70 [ 1689.307965] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1689.312722] ? do_syscall_64+0x26/0x620 [ 1689.316888] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1689.322342] ? do_syscall_64+0x26/0x620 [ 1689.326306] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1689.330984] ? trace_hardirqs_on+0x67/0x220 [ 1689.335297] do_syscall_64+0xfd/0x620 [ 1689.339095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1689.344276] RIP: 0033:0x459a29 [ 1689.347465] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1689.366542] RSP: 002b:00007f2f76766cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1689.374243] RAX: ffffffffffffffda RBX: 000000000075bf28 RCX: 0000000000459a29 [ 1689.381507] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf28 [ 1689.388860] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1689.396119] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf2c [ 1689.403378] R13: 00007fffc6d1ad1f R14: 00007f2f767679c0 R15: 000000000075bf2c [ 1689.410736] [ 1689.410741] ====================================================== [ 1689.410745] WARNING: possible circular locking dependency detected [ 1689.410748] 4.19.75 #0 Not tainted [ 1689.410752] ------------------------------------------------------ [ 1689.410756] syz-executor.3/31642 is trying to acquire lock: [ 1689.410758] 000000002b98ec5c ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 1689.410770] [ 1689.410773] but task is already holding lock: [ 1689.410775] 000000008f3c9712 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 1689.410786] [ 1689.410790] which lock already depends on the new lock. [ 1689.410791] [ 1689.410793] [ 1689.410797] the existing dependency chain (in reverse order) is: [ 1689.410799] [ 1689.410800] -> #3 (&obj_hash[i].lock){-.-.}: [ 1689.410811] _raw_spin_lock_irqsave+0x95/0xcd [ 1689.410815] __debug_object_init+0xc6/0xc30 [ 1689.410818] debug_object_init+0x16/0x20 [ 1689.410821] hrtimer_init+0x2a/0x300 [ 1689.410824] init_dl_task_timer+0x1b/0x50 [ 1689.410827] __sched_fork+0x22a/0x4b0 [ 1689.410829] init_idle+0x75/0x800 [ 1689.410832] sched_init+0x952/0x9f0 [ 1689.410835] start_kernel+0x402/0x8c5 [ 1689.410839] x86_64_start_reservations+0x29/0x2b [ 1689.410842] x86_64_start_kernel+0x77/0x7b [ 1689.410845] secondary_startup_64+0xa4/0xb0 [ 1689.410847] [ 1689.410848] -> #2 (&rq->lock){-.-.}: [ 1689.410858] _raw_spin_lock+0x2f/0x40 [ 1689.410861] task_fork_fair+0x6a/0x520 [ 1689.410864] sched_fork+0x3af/0x900 [ 1689.410867] copy_process.part.0+0x1859/0x7a30 [ 1689.410870] _do_fork+0x257/0xfd0 [ 1689.410873] kernel_thread+0x34/0x40 [ 1689.410875] rest_init+0x24/0x222 [ 1689.410878] start_kernel+0x88c/0x8c5 [ 1689.410882] x86_64_start_reservations+0x29/0x2b [ 1689.410885] x86_64_start_kernel+0x77/0x7b [ 1689.410888] secondary_startup_64+0xa4/0xb0 [ 1689.410889] [ 1689.410891] -> #1 (&p->pi_lock){-.-.}: [ 1689.410901] _raw_spin_lock_irqsave+0x95/0xcd [ 1689.410904] try_to_wake_up+0x94/0xf50 [ 1689.410907] wake_up_process+0x10/0x20 [ 1689.410910] __up.isra.0+0x136/0x1a0 [ 1689.410912] up+0x9c/0xe0 [ 1689.410915] __up_console_sem+0xb7/0x1c0 [ 1689.410918] console_unlock+0x6c7/0x10b0 [ 1689.410921] vprintk_emit+0x238/0x690 [ 1689.410924] vprintk_default+0x28/0x30 [ 1689.410927] vprintk_func+0x7e/0x189 [ 1689.410929] printk+0xba/0xed [ 1689.410932] kauditd_hold_skb.cold+0x3f/0x4e [ 1689.410936] kauditd_send_queue+0x12b/0x170 [ 1689.410938] kauditd_thread+0x732/0xa60 [ 1689.410941] kthread+0x354/0x420 [ 1689.410944] ret_from_fork+0x24/0x30 [ 1689.410945] [ 1689.410947] -> #0 ((console_sem).lock){-.-.}: [ 1689.410958] lock_acquire+0x16f/0x3f0 [ 1689.410961] _raw_spin_lock_irqsave+0x95/0xcd [ 1689.410964] down_trylock+0x13/0x70 [ 1689.410967] __down_trylock_console_sem+0xa8/0x210 [ 1689.410970] console_trylock+0x15/0xa0 [ 1689.410973] vprintk_emit+0x21d/0x690 [ 1689.410976] vprintk_default+0x28/0x30 [ 1689.410979] vprintk_func+0x7e/0x189 [ 1689.410981] printk+0xba/0xed [ 1689.410984] __warn_printk+0x9b/0xf3 [ 1689.410987] debug_print_object+0x168/0x250 [ 1689.410990] debug_check_no_obj_freed+0x29f/0x464 [ 1689.410993] kmem_cache_free+0x18f/0x260 [ 1689.410996] free_task+0xdd/0x120 [ 1689.410999] __put_task_struct+0x20f/0x4c0 [ 1689.411002] finish_task_switch+0x52b/0x780 [ 1689.411005] __schedule+0x86e/0x1dc0 [ 1689.411008] schedule+0x92/0x1c0 [ 1689.411011] futex_wait_queue_me+0x30c/0x600 [ 1689.411014] futex_wait+0x228/0x5e0 [ 1689.411016] do_futex+0x175/0x1d70 [ 1689.411019] __x64_sys_futex+0x400/0x590 [ 1689.411022] do_syscall_64+0xfd/0x620 [ 1689.411025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1689.411027] [ 1689.411030] other info that might help us debug this: [ 1689.411032] [ 1689.411034] Chain exists of: [ 1689.411036] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 1689.411049] [ 1689.411052] Possible unsafe locking scenario: [ 1689.411054] [ 1689.411057] CPU0 CPU1 [ 1689.411060] ---- ---- [ 1689.411061] lock(&obj_hash[i].lock); [ 1689.411068] lock(&rq->lock); [ 1689.411075] lock(&obj_hash[i].lock); [ 1689.411081] lock((console_sem).lock); [ 1689.411087] [ 1689.411089] *** DEADLOCK *** [ 1689.411091] [ 1689.411094] 1 lock held by syz-executor.3/31642: [ 1689.411096] #0: 000000008f3c9712 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 1689.411109] [ 1689.411111] stack backtrace: [ 1689.411115] CPU: 1 PID: 31642 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 1689.411121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1689.411123] Call Trace: [ 1689.411126] dump_stack+0x172/0x1f0 [ 1689.411130] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1689.411133] __lock_acquire+0x2e19/0x49c0 [ 1689.411136] ? mark_held_locks+0x100/0x100 [ 1689.411139] ? kvm_clock_read+0x18/0x30 [ 1689.411142] ? kvm_sched_clock_read+0x9/0x20 [ 1689.411145] lock_acquire+0x16f/0x3f0 [ 1689.411148] ? down_trylock+0x13/0x70 [ 1689.411151] _raw_spin_lock_irqsave+0x95/0xcd [ 1689.411154] ? down_trylock+0x13/0x70 [ 1689.411156] ? vprintk_emit+0x21d/0x690 [ 1689.411159] down_trylock+0x13/0x70 [ 1689.411162] ? vprintk_emit+0x21d/0x690 [ 1689.411165] __down_trylock_console_sem+0xa8/0x210 [ 1689.411168] console_trylock+0x15/0xa0 [ 1689.411171] vprintk_emit+0x21d/0x690 [ 1689.411174] vprintk_default+0x28/0x30 [ 1689.411176] vprintk_func+0x7e/0x189 [ 1689.411179] printk+0xba/0xed [ 1689.411182] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1689.411185] ? __warn_printk+0x8f/0xf3 [ 1689.411188] __warn_printk+0x9b/0xf3 [ 1689.411191] ? add_taint.cold+0x16/0x16 [ 1689.411194] debug_print_object+0x168/0x250 [ 1689.411197] debug_check_no_obj_freed+0x29f/0x464 [ 1689.411200] kmem_cache_free+0x18f/0x260 [ 1689.411202] free_task+0xdd/0x120 [ 1689.411205] __put_task_struct+0x20f/0x4c0 [ 1689.411209] finish_task_switch+0x52b/0x780 [ 1689.411212] ? switch_mm_irqs_off+0x7fa/0x1360 [ 1689.411215] __schedule+0x86e/0x1dc0 [ 1689.411219] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1689.411222] ? lock_downgrade+0x810/0x810 [ 1689.411225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.411229] ? get_futex_value_locked+0xd6/0x100 [ 1689.411231] schedule+0x92/0x1c0 [ 1689.411234] futex_wait_queue_me+0x30c/0x600 [ 1689.411238] ? handle_futex_death.part.0+0x250/0x250 [ 1689.411241] ? lock_pi_update_atomic+0x120/0x120 [ 1689.411244] futex_wait+0x228/0x5e0 [ 1689.411247] ? futex_wait_setup+0x390/0x390 [ 1689.411250] ? kasan_check_read+0x11/0x20 [ 1689.411253] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1689.411256] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 1689.411259] ? futex_wake+0x179/0x4d0 [ 1689.411262] do_futex+0x175/0x1d70 [ 1689.411265] ? __might_fault+0x12b/0x1e0 [ 1689.411268] ? exit_robust_list+0x2c0/0x2c0 [ 1689.411271] ? kasan_check_read+0x11/0x20 [ 1689.411273] ? _copy_to_user+0xc9/0x120 [ 1689.411277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1689.411280] __x64_sys_futex+0x400/0x590 [ 1689.411283] ? do_futex+0x1d70/0x1d70 [ 1689.411286] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1689.411289] ? do_syscall_64+0x26/0x620 [ 1689.411293] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1689.411295] ? do_syscall_64+0x26/0x620 [ 1689.411298] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1689.411301] ? trace_hardirqs_on+0x67/0x220 [ 1689.411304] do_syscall_64+0xfd/0x620 [ 1689.411308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1689.411310] RIP: 0033:0x459a29 [ 1689.411320] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1689.411323] RSP: 002b:00007f2f76766cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1689.411331] RAX: ffffffffffffffda RBX: 000000000075bf28 RCX: 0000000000459a29 [ 1689.411335] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf28 [ 1689.411339] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1689.411344] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf2c [ 1689.411348] R13: 00007fffc6d1ad1f R14: 00007f2f767679c0 R15: 000000000075bf2c [ 1689.412964] Kernel Offset: disabled [ 1690.226470] Rebooting in 86400 seconds..